fbpx

CYBER 2 OT

Preventing cyber-attacks from reaching the controllers and spreading through the network

CYBER 2 OT

Preventing cyber-attacks from reaching the controllers and spreading through the network

THE PROBLEM

THE PROBLEM

  • Today there is no defense against attacks in the OT field
  • There is a fear of updates /changes in the controllers
  • Regulating applies mainly to identify/detect
  • The attacks in the OT field have a greater significance than in the IT field

THE SOLUTION

  • The only system that provides prevention
  • No need to install over the controller
  • Easy to operate
  • Works in unconnected networks
  • Does not slow down the network
  • Does not require any updates

OT/IOT ATTACKS

MARKING APPROVED PROGRAMS

THE IT MANAGER:

MARKS APPROVED PROGRAMS (1-2)
THAT ARE ALLOWED TO ACCESS THE NETWORK RESOURCES (THE PROGRAMS THAT OPERATES THE CONTROLLER)

NOT APPROVED PROGRAMS:

EVERY SOFTWARE THAT WAS NOT MARKED AS AN APPROVED PROGRAM (INCLUDING EVERY NEW AND UNKNOWN PROGRAM)

CHAOS ENGINE

patented

FULL PROTECTION

In a closed vs a widespread environment

SINGLE GATEWAY

single-getaway

MULTIPLE GATEWAY

multiple-getaway

Cyber 2.0's solution to OT and Scada systems

We first developed the product for the IT world, and then expanded it to provide a complete solution to the OT world. We currently support a number of water systems in the State of Israel. Our system is installed in a number of factories in Israel and around the world, as well as in municipalities in Israel and the United States, in hospital chains in India, and more.

The advantage of Cyber 2.0 is that it is a single system, which protects the computers in the organization, and at the same time provides a complete solution for employees working from home (WFH), and also completely protects important facilities and infrastructure. As mentioned, the technology has been tested and proven and has achievements in its field.

The system operates in several modes according to the customer’s choice

Cyber 2.0 Modes

Explanation of the various modes and capabilities of the Cyber 2.0 system:

  • Monitor
  • Isolation
  • Defense

Monitor Mode

Monitor Mode is the initial mode of the system when it is first installed on a network. It is designed to gather and analyze information about the network it is installed on.

Capabilities

  • Creating a comprehensive inventory of every process or file that has been active since the system was installed and the information stored .
  • It comprises:
    • Files
    • Versions
    • Installed location
    • Various other information
  • Storing every network transaction on the installed system – the default setting is for 45 days (data can be stored indefinitely , depending on storage size)
  • Analyzing every installed software, version or executable using the file Hash, and showing every known malicious software in your organization
  • Allowing to create, edit and modify Cyber 2.0 Dynamic list
    • Nothing will get blocked
    • The customer will see what would or should have been blocked

Advantages

  • Full view of the system
  • A complete and comprehensive Inventory
  • Full analysis of the network  

Isolation Mode

Isolation Mode is designed to allow the organization to have fast and powerful protection against ransomware and similar forms of attack while keeping all the benefits of Monitor Mode.

Isolation Mode only prevents and blocks access to the file system. Any other protocol will not be blocked, only reported.

Capabilities

  • All the benefits of monitor mode
  • Example of Protected Protocols:
    • UNC
    • SMB
    • Similar Network File System protocol
  • Protects software from accessing the network file system
    • Program with admin privileges will be blocked
    • Access to map drive will be blocked
  • Dynamic list automation is supported in Isolation Mode, allowing for smooth and almost zero maintenance
  • No other protocol is blocked or affected

Advantages

  • Full view of the system
  • A complete and comprehensive inventory
  • Fully analysis of the network 
  • Lightweight and easily manageable
  • Powerful protection against the spread and effect of ransom virus and similar malicious software

Defense Mode

Internal Defense Mode is designed to bring the most cutting-edge defense into  the organization. It creates an unappeasable chaos barrier between the computer of a specific network, and does not allow any unknown or unwanted application to traverse the network.

Any attempt by malicious software to bypass or deactivate the mechanism will lock the malicious software on the original computer, while the allowed programs work unhindered.

Capabilities

  • All the benefits of Monitor Mode
  • All the benefits of Isolation Mode
  • All communication is scrambled
  • All network traffic is subject to the dynamic list rules
  • Dynamic list automation is supported in Defense Mode, allowing for smooth and almost zero maintenance

Advantages

  • Full view of the system
  • A complete and comprehensive Inventory
  • Fully analysis of the network
  • Light weight and easily manageable
  • Powerful protection against the spread and effect of known and unknown malicious software