Top Banner
ThetaRay Protecting Your Critical Infrastructure Against Unknown Threats
4

Protecting Your Critical Infrastructure Against …...Today’s critical infrastructure networks are no longer isolated or air-gapped environments. Rather, increasingly connected by

May 28, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Protecting Your Critical Infrastructure Against …...Today’s critical infrastructure networks are no longer isolated or air-gapped environments. Rather, increasingly connected by

ThetaRay

Protecting Your Critical Infrastructure Against Unknown Threats

Page 2: Protecting Your Critical Infrastructure Against …...Today’s critical infrastructure networks are no longer isolated or air-gapped environments. Rather, increasingly connected by

ThetaRay

NEW SECURITY CHALLENGES IN A HYPER-CONNECTED INDUSTRIAL WORLDToday’s critical infrastructure networks are no longer isolated or air-gapped environments. Rather, increasingly connected by Industrial Internet protocols, organizations that constitute the backbone of the economy are amidst a digital revolution they must find ways to secure.

The explosion of connectivity and access, driven by the need to boost operations and cut costs, has exposed critical infrastructure operational networks to a new generation of targeted cyber-attacks and operational threats.

While unknown, targeted attacks are on a constant rise, existing signature or rule-based security simply cannot defend against them, leaving organizations vulnerable and exposed. A new generation of threats requires a new generation of intelligent, rapidly evolving security capabilities.

INTRODUCING THETARAY’S UNKNOWN THREAT PROTECTIONThetaRay’s industrial solutions protect against unknown cyber and operational threats that target critical infrastructure providers.

Leveraging patented Hyper-dimensional, Multi-domain Big Data Analytics™ developed by research groups in leading universities and validated by multiple organizations worldwide, ThetaRay’s math-based, rule-free solutions are specifically designed to detect unknown unknowns, in real-time, and before any damage can occur.

Built upon ThetaRay’s Critical Threat Protection™ platform, our solutions offer end-to-end threat detection – from data processing and storage, automatic anomaly detection, alert generation/distribution and event investigation, to reporting and management.

The solution is available as a virtual appliance (software running on standard/virtualized servers), physical appliance, or cloud-based, supporting flexible deployment scenarios including on-premise and remote/central operating center.

Early warning system detecting unknown operational events

PLCTurbine Smart Meter

Generic Sensor

IndustrialSwitch

CyberProtecting against unknown cyber threats

Operational

Detect unknown malware, hidden APTs, and advanced Stuxnet-like targeted cyber-attacks that have already penetrated critical networks.

Uncover Cyber Attacks

INDUSTRIAL SOLUTIONSThetaRay’s industrial solutions cover a wide array of unknown threats ranging from targeted cyber-attacks and policy violations to various operational events.

An early warning system and predictive analytics to detect the first signs of adverse operational events, such as equipment malfunction or imminent network outages.

Prevent Operational Events

Page 3: Protecting Your Critical Infrastructure Against …...Today’s critical infrastructure networks are no longer isolated or air-gapped environments. Rather, increasingly connected by

Event Detected REST / SOAP API

SIEMThetaRayThreat UI

Customer Control& Management

CustomerSystems

ThetaRay Solution

Appliance Cloud

VirtualAppliance (SW)

OR OR

OR

Manager

SCADA / Machine Data

Logs

HMI / Host DataICS / SCADA

Network Traffic

ThetaRay

THE NEW INDUSTRIAL THREAT PROTECTION PARADIGM

PROTECTING CRITICAL INFRASTRUCTURE

Superior Unknown Threat DetectionThetaRay’s field-proven solutions are characterized by high detection rates with extremely low false positive levels. They are specifically designed to identify unprecedented threats using completely rule-free, math-based detection that does not rely on any patterns, signatures or heuristics.

Protect Against Sophisticated OT & IT Based AttacksThetaRay is the only solution that can detect targeted Stuxnet-like attacks by unifying and simultaneously analyzing all OT & IT data.

Continuously monitoring thousands of parameters/dimensions from various domains (including network traffic, ICS/SCADA traffic, machine data, Historian, host/HMI-based data), organizations can concurrently see all security and operational anomalies across multiple environments, systems and protocols.

Automatically Detect Threats Before Any Damage Can OccurReal-time threat detection enables customers to automatically identify the earliest signs of hidden threats, within seconds, taking action before any impact to safety, production or revenues can occur.

The detection process, from the moment new data is received, through to anomaly detection and alert generation, is completely automatic and does not require any manual intervention, threshold/rule settings or big data expertise.

Rapid Threat MitigationAuto-generated, laser-focused forensic information (anomaly score, exact measurement and parameters triggering the alert, similar events), provides security and operational teams with the means to rapidly investigate and mitigate threats, preventing unplanned downtime of critical networks and avoiding performance issues.

Many Environments – One SolutionLeveraging its unique context-free detection, the same solution can seamlessly protect multiple different customer environments and sites, making it ideally suited for real life, massively heterogeneous, industrial networks.

This includes any industrial equipment, HW vendors systems and industrial protocols (Modbus, OPC, ICCP, DNP3 etc.) in any critical infrastructure segment.

Protect Your InvestmentThetaRay’s solutions are non-intrusive, and easily connect to existing data sources, storage servers and 3rd party investigation/control/management systems.

This, combined with fully automated threat detection not requiring any dedicated user allocation, and ability to seamlessly scale-up to support new environments, means that existing CI networks, systems and policies remain unchanged.

Electrical & Water Utilities

Oil & Gas Chemical Plants

HealthcareTransportation & Aviation

Critical Manufacturing Facilities

Threat Detection Flow

Page 4: Protecting Your Critical Infrastructure Against …...Today’s critical infrastructure networks are no longer isolated or air-gapped environments. Rather, increasingly connected by

01001100011011110111001001100101011011010010000001101001011100000111001101110101011011010010000001100100011011110110110001101111011100100010000001110011011010010111010000100000011000010110110101100101011101000010110000100000011000110110111101101110011100110110010101100011011101000110010101110100011101010111001000100000011000010110010001 01001100011011110111001001100101011011010010000001101001011100000111001101110101011011010010000001100100011011110110110001101111011100100010000001110011011010010111010000100000011000010110110101100101011101000010110000100000011000110110111101101110011100110110010101100011011101000110010101110100011101010111001000100000011000010110010001 010011000110111101110010011001010110110100100000011010010111000001110011011101010110110100100000011001000110111101101100011011110111001000100000011100110110100101110100001000000110

1 Hanagar Street, Hod HaSharon, 4501303, IsraelTel: +972-2-640-9763 I [email protected]

ThetaRayw w w. t h e t a r a y. c o m