- Company (that provides the nominated product / solution / service): CyberX
- Website: https://cyberx-labs.com/
- Company size (employees): 50 to 99
- Country: United States
- Type of solution: Software
- Approximate number of users worldwide: 1,200 Installations
What other awards did this nomination receive in the previous 12 months?
1. Ariel Litvin, chief information security officer (CISO) at First Quality Enterprises (FQE) and a client of CyberX, the IIoT and industrial control system (ICS) security company, was a finalist for the 2018 Northeast Information Security Executive (ISE) of the Year Award. Litvin was recognized for his outstanding leadership and exemplary achievements in information security, risk management, privacy and network security.
Litvin was acknowledged for implementing a cohesive IT/OT security monitoring and governance strategy at FQE using CyberX. By centralizing digital risk management in a single function, FQE can more effectively address advanced threats across both IT and OT, as well leverage existing investments in IT security personnel, SOC workflows, and security technologies such as SIEM and orchestration systems.
Litvin was recognized for fostering closer collaboration between the firm’s IT and OT organizations, and for helping remove silos that have traditionally existed between IT and OT in other companies.
2. According to Gartner, CyberX is "One of the longest-standing providers in OT security … CyberX’s competitive differentiation is its fast and easy deployment … By supporting unified IT/OT security and governance, CyberX supports CISOs in dealing with scarce resources and more effectively addressing threats across both IT and OT.”
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
-It’s a comprehensive solution incorporating end-to-end capabilities including continuous asset discovery and network topology mapping; risk and vulnerability management; and threat monitoring and response.
-It’s the industry’s most open and interoperable ICS/SCADA cybersecurity platform, integrating with leading products including IBM QRadar, Splunk, ArcSight, LogRhythm, Palo Alto Networks, Checkpoint, ServiceNow, IBM Resilient, and CyberArk. This unified approach to IT/OT security monitoring and governance enables CISOs to effectively address advanced threats across both IT and OT, leverage scarce resources, and remove silos between IT and OT.
-Unique in the industry, CyberX’s integration with Palo Alto Networks and other firewalls automatically creates new firewall policies to block sources of malicious traffic identified by the CyberX platform.
Purpose-built for ICS/SCADA cybersecurity, the CyberX platform incorporates a deep embedded understanding of ICS/SCADA protocols, vulnerabilities, devices, and behaviors that works to detect dangerous malware before it strikes and causes devastating effects to our public and private infrastructure. The platform uses patented, ICS-aware behavioral anomaly detection algorithms to immediately identify ICS-specific assets and network topologies, network and endpoint vulnerabilities, and threats such as malware and zeroday attacks (WannaCry, NotPetya, TRITON, CrashOverride, etc.) — in less than an hour — without relying on rules or signatures, specialized skills, or prior knowledge of the environment.
The CyberX platform also enables a unified IT/OT security governance strategy and leverages scarce resources across both IT and OT by natively integrating with existing security operations center (SOC) workflows, security stacks, and over 22 different SCADA/ICS protocols. The platform enables security analysts to perform investigations via a visual interface and workflow, making it easy to see how relationships connect across data sources and throughout complex attack chains. The CyberX platform also allows for real-time alerting and anomaly detection, along with detailed contextual information to aid in investigations and forensics.
Additionally, CyberX’s automated ICS threat modeling technology predicts the most likely paths of attacks on ICS/SCADA networks, enabling network defenders to prioritize mitigations for their most valuable “crown jewel” assets.