Features Overview

Features Overview:

  • Secure Remote Access with User Activity Correlation.
  • User Activity Log.
  • Remote Access Connection Map.
  • Integration with VPN gateways for tracking and enforcement.

The Benefits for Your Organization:

  • Enable safe remote access to critical OT environments.
  • Increased visibility into remote users’ activities in the OT network.
  • Correlate between OT device level actions and remote connections.
  • Detect unauthorized actions.
  • No additional hardware – simple, cost effective deployment.
  • No additional configuration of remote access policy.

 

SCADAfence OT Remote Access Security. Manage Your Unmanaged Remote Access Connections

SCADAfence OT Remote Access Security is the only solution that provides full visibility into remote access connections and allows security teams to track and detect user activities that are out of that user’s profile or are malicious in nature.

The Challenge:

Recently, most of the global workforce has transitioned to working remotely. While every organization has invested a lot into remote work and have fully digitalized their workforce, not a whole lot was invested in security controls around the connections themselves. Working remotely means opening networks up to exponentially more external access – networks which were previously never opened to such access, or had very limited remote access to them.

In an Instant, the Exposure of OT Networks has Increased Dramatically:

Increased Exposure: The number of external connections, in addition to the fact that workstations used in remote access are also connected to the internet and can be compromised. This can give attackers access to critical assets – such as this cyber-attack that we discovered on a remote server.

Hard Perimeter, Soft Belly Architecture: Once remote users log in, they can often access a wide range of critical hosts, without further access control.

Lack of Correlation Between Remote Users & Process Manipulation: After initial authentication at the gateway, there is no way to associate OT sessions with the logged-in users. This lack of association and attribution increases the risk to the OT network.

Increased Complexity: People accessing from home means more remote locations and end-devices. This adds complexity and thus further increases exposure. These remote access connections are now a low hanging fruit for attackers, who leverage them for different purposes and can lead to the world’s largest cyber attack.

 

 

Here’s a video that shows how security teams can gain visibility into remote access connections

Remote Access Connectivity Map

  • Correlate between OT device level actions and remote connections.
  • Visualize the remote access path from the VPN gateway to the industrial device.
  • Expand and track all network actions hop by hop.
Interested in learning more? Request a Demo

User Activity Log

 

  • Get full visibility into network access user activities.
Interested in learning more? Request a Demo

Helpful Resources

Webinar

[Webinar] How Industrial Networks Can Remain Secure During the COVID-19 Crisis.

White Paper

OT Remote Access Security

Video

[VIDEO] Rafa Pharmaceuticals

White Paper

Anatomy Of A Targeted Ransomware Attack

BG_learning more

Interested in learning more?

Shedule a Demo