Industrial network & behaviour analysis

Identifying protocols and applications in network traffic, analysing extracted data and visualising anomalies to create clarity regarding the ongoing situation. The DPI (deep packet inspection) solution classifies and decodes the data streams down to the content layer. Authorised protocols are thus also checked for hidden attacks. Security problems originating from infected machines, incorrect configuration or potential cyber attacks are detected.

Industrial system log collection & analysis

Collection, analysis and the correlation of logs from different sources in the OT environment, for warning when there are security problems or potential risks.

Selective vulnerability management & assessment

Vulnerability scans (vulnerability management and assessment, VAS) are run in selected areas and environments. Scanning does not cause any data availability or integrity problems.