Cyber Challenge Pocket Guide
Axonius develops and delivers a unified, extensible, and open platform that integrates information from networked devices and existing device-specific standalone management solutions, creating a single visibility and control environment. Axonius improves an organization's security and operational posture, allowing IT and security operations teams to safely enable device adoption and usage at scale.
Claroty was conceived to secure the safety and reliability of industrial control networks. The Claroty platform is an integrated set of cyber-security products that provide extreme visibility, unmatched cyber threat detection, secure remote access, and risk assessments for industrial control networks (ICS/OT). The company's technology has been tested, selected, and adopted by industrial automation control vendors and networking companies. Its strategic partnerships also include system integration and managed security service firms worldwide.
CyberInt develops solutions for providing cyber intelligence and protecting online activities in order to help companies of all sizes and types eliminate potential threats before they become crises. The company enables its customers to combat and respond to advanced cyberthreats that would normally go unnoticed by standard security controls, while at the same time protecting their brand, digital assets, and customers.
Indegy provides situational awareness and real-time security for industrial control networks to ensure operational continuity and reliability. The Indegy platform delivers comprehensive visibility and oversight into all OT activities, including changes to controller logic, configuration, and state. The platform works across all vendor devices by utilizing control network inspection of proprietary control communications and patent-pending, agentless controller verification technology that validates PLC firmware, code, and configuration.
Preempt protects enterprises from security breaches and malicious insiders with a patented behavioral firewall that combines user and entity behavior analytics and adaptive response. This proactive approach allows organizations to mitigate threats in real time without engaging security teams. Preempt provides visibility into enterprises' risky users, end-points, stale or compromised accounts, and privileged user behavior. By monitoring and learning the behavior of every user, group, and device on the network, including when and where they log in, their role, system privileges, and password strength, Preempt helps organizations identify malicious activity.
ScadaFence offers cybersecurity solutions to ensure the operational continuity of industrial (ICS/SCADA) networks. Its solutions are designed to make day-to-day operations visible, detect cyber attacks, and offer forensics tools for improving responsiveness. The solutions are suitable for the pharmaceutical, chemical, food and beverage, and automotive industries.
ScadaFence’s passive solution reduces operational risks such as downtime, process manipulation, and theft of sensitive proprietary information. The company offers a comprehensive product suite that includes continuous real-time monitoring of the industrial environment as well as lightweight tools designed to automate security assessment.
XM's HaXM is a fully automatic hacking machine, simulating multiple large-scale APTs against any organization. By modeling different threat actors and challenging the network continuously from every possible angle, HaXM is able to identify the most critical issues for remediation and provide insights about the true security posture.