Known industrial security weaknesses are increasingly turning into actual attacks, causing producers around the globe to search for more robust solutions to help protect operations. To meet this need, industrial security software provider Claroty and Rockwell Automation will work together to combine their security products and services into future, packaged security offerings.
After a competitive review process, Rockwell Automation selected Claroty for the company’s anomaly-detection software purpose-built for industrial network security. The software creates a detailed inventory of an end user’s industrial network assets, monitors traffic between those assets, and analyses communications at their deepest level. Detected anomalies are reported to plant and security personnel with actionable insights to help enable efficient investigation, response and recovery.
“More connected control systems combined with the potential for more attacks on those systems have made cybersecurity a top concern in the industrial world,” said Scott Lapcewich, vice president and general manager, customer support and maintenance, Rockwell Automation. “Claroty’s deep-visibility software platform and expertise in industrial security made the company a natural fit for substantial collaboration as we grow our existing portfolio of security service and support offerings.”
A key characteristic of the Claroty software is its ability to explore the deepest level of industrial network protocols without adversely impacting the system. This enables end users to identify even the smallest anomalies while protecting complex and sensitive industrial networks. Traditional IT security software often uses active queries and requires a footprint on the network, which can ultimately disrupt operations. However, the Claroty platform uses a passive-monitoring approach to safely inspect traffic without the risk of disruption.
“The Claroty platform can detect a bad actor’s activities at any stage, whether they’re trying to gain a foothold on a network, conduct reconnaissance or inflict damage,” said Amir Zilberstein, co-founder and CEO, Claroty. “It also can detect human errors and other process integrity issues, which are often more common than threats from bad-actors. For example, the software monitors for critical asset changes that, if done incorrectly, could result in unexpected downtime. The system also identifies network-configuration issues that could expose a system to outside threats.”