Network monitoring with anomaly detection
“In industrial companies and critical infrastructures in the energy and water industry, INSYS icom is known for its high-quality, high-performance components. The integration of our industrial anomaly detection Rhebo Industrial Protector on routers from INSYS icom allows operators to monitor M2M and IIoT communication at the relevant points in their OT network, thus ensuring secure and stable industrial control systems.”
Rhebo GmbH, Leipzig (D)
Your added value with Rhebo
With developments such as IIoT, Industry 4.0 and Smart Grid, industrial control systems in critical infrastructure and industrial companies are becoming the nervous system of business success. However, the connection to office IT, the Internet and remote access points increases the risk of cyberattacks and spillover effects.
At the same time, the complexity and heterogeneity of components increase the risk of technical errors in industrial communication. Perimeter security systems such as firewalls are also blind to unknown security gaps, new types of attack patterns and technical errors within ICS.
Rhebo’s mission is to ensure comprehensive cyber security, plant availability and process stability in industrial enterprises and critical infrastructure companies.
Technical error states, communication failures and misconfigurations, as well as cyberattacks, manipulation and sabotage attempts are detected before they lead to serious disruptions of production or supply.
With Rhebo Industrial Protector, an integrated network monitoring with anomaly detection is realized on the industrial routers and IoT gateways of INSYS icom. Thanks to the integrated Linux environment LXC the application runs directly on the routers. No additional hardware is required. This guarantees increased cyber security and stability of industrial processes.
Rhebo Industrial Protector
The integrated Rhebo Industrial Protector enables Information Security Officers and process engineers to react quickly, proactively and adequately to disruptive changes in industrial control system communication. They can mitigate cyberattacks and technical error states alike before they lead to downtime or loss of efficiency. Through the real-time asset inventory within the ICS, they also gain complete up-to-date visibility. This facilitates risk analysis, segmentation and performance optimization as part of the continuous improvement process.