Compare MCAFEE vs FORTINET in Industrial Control Systems Security Solutions




Total 100 Vendors
Advance Filters
#8
FORTINET
3.1

Fortinet emphasizes on R&D activities and promotes innovation. For instance, the company invested US

#10
MCAFEE
2.8

McAfee continuously monitors the ICS security market to identify the trends and various types of con

Add to Compare
STRENGTHS
  • Product Maturity/Modes
    Cloud
  • Product Maturity/Modes
    Hybrid
  • Product Maturity/Modes
    On-premise
  • Product Maturity/Development Tools
    Network traffic anomaly detection tools
  • Product Maturity/Modes
    On-premise
  • Product Maturity/Development Tools
    IOC detection tools
WEAKNESSES
Product Maturity
3.25
2.30
+ Suggest Product Comparables
Feature and Functionality
3.20
2.65
Development Tools
5.00
3.40
Network traffic anomaly detection tools
Yes
Yes
IOC detection tools
Yes
Yes
Log review tools
Yes
No
Outlier analysis tools
Yes
Yes
System artifact review tools
Yes
No
Reverse engineering tools
Yes
No
Multi-purpose tools
Yes
Yes
Core Features
2.45
2.30
Control systems
4.40
5.00
Distributed Control System (DCS)
Yes
Yes
HMI panels
Yes
Yes
Remote Terminal Unit (RTU)
No
Yes
Engineering workstations
Yes
Yes
SCADA
Yes
Data not Available
Intelligent Electronic Devices (IEDs)
Yes
Yes
Programmable Logic Controllers (PLCs)
Yes
Yes
Security standards
2.65
2.30
Oil and gas
1.50
0.00
WIB M-2784 (Process Control Domain – Security Requirements for Vendors)
Yes
No
Common standards
3.60
0.00
General Data Protection Regulation
Yes
No
Critical Infrastructure Protection Standards (NERC-CIPs)
Yes
No
ISA/IEC 62443-3-3
Yes
No
ISA/IEC 62443-2-1
Yes
No
Nuclear
3.60
5.00
NRC - Regulatory Guide 5.71
Yes
Yes
IAEA - Computer Security at Nuclear Facilities
Yes
Yes
NRC -10 CFR - 73.54
No
Yes
Manufacturing
1.50
4.95
NIST CSF
No
Yes
ISO/TR 22100-4
No
Yes
DFARS
Yes
Yes
NIST 171
No
Yes
Energy and Power
1.95
0.00
ISO/IEC TR 27019
Yes
No
DoE - 21 steps for SCADA security
Yes
No
Functionality
1.05
0.70
Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
No
No
Central management
Yes
Yes
Distributed Denial Of Service
No
No
DNS-based attack mitigation
Yes
Yes
Security Information And Event Management (SIEM)
No
No
Flow Anomaly Processor
Yes
Yes
Firewall
No
No
Traffic classification
Yes
Yes
Sandbox service
Yes
No
Unified Threat Management
No
No
Stream Scanning
Yes
Yes
Identity And Access Management
No
No
Web single sign-on (SSO)
Yes
Yes
Data Loss Prevention
No
No
Exact Data Matching
Yes
Yes
Whitelisting
Yes
No
File supported - .ocx
Yes
No
File supported - .exe
Yes
No
File supported - .dll
Yes
No
File supported - Kernel-mode drivers
Yes
No
File supported - Command line interpreters
Yes
No
Antivirus/Malware
No
No
Device Control
Yes
Yes
Malware protection
No
No
Services
0.60
0.55
Post Deployment
0.95
0.95
Support & Maintenance
No
No
Deployment
5.00
3.10
Modes
5.00
2.05
Cloud
Yes
No
Hybrid
Yes
No
On-premise
Yes
Yes
Implementation Methodology
0.0
5.00
Risk and Threat Assessment
No
Yes
Delivery
0
5.00
Channel of Delivery
0
5.00
System Integrators
Data not Available
Yes
Company Maturity
3.00
3.35
+ Suggest Company Comparables
Use Case Maturity
0
0
+ Suggest More Usecase

Reviews

External,
External,
(*)(*)(*)(*)(*)5

“Best firewall solution"

McAfee Firewall Enterprise uses SecureOS and Type Enforced Access Control to ensure efficient security. SecureOS is a UNIX operating system; it uses Type Enforcement security technology that is patented. This ensures superior network security without the need for emergency security patches.
External,
External,
(*)(*)(*)(*)(*)5

“Application Control"

This discovers threats and suspicious behavior related to specific applications.
External,
External,
(*)(*)(*)(*)(*)5

“Enhanced network security"

Network Security from Siemens helps customers to be prepared for challenges; it helps them use it as a base to build digital enterprises.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
(*)(*)(*)(*)(*)5

“Provides better antimalware solution"

McAfee Firewall Enterprise is an anti-virus module used on HTTP, FTP, and Send mail rules for the detection and subsequent blocking of viruses, spyware, and prohibited MIME extensions.
Other,Company Name Classified
Other, Company Name Classified
(*)(*)(*)(*)(*)5

“Robust and easy to use"

Siemens’ modern Distributed Control System is robust and easy to use once integrated with all tools. Siemens’ SIMATIC PCS 7 is a process automation software that enables advanced process control, virtual commissioning & process simulation and also monitors plant performance through one integrated engineering system.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Advanced security solutions"

McAfee has always been innovative and hence provides advanced software solutions to manage systems centrally. It also helps prevent the proliferation of unauthorized apps and malware.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Better Anomaly Detection solution"

The Siemens Secure-NOK SNOK® Network Anomaly Detection solution runs on the RX1500 Application Processing Engine (APE) module. This APE is x86-based and is designed to use a single-line module slot in a Siemens RUGGEDCOM RX1500 device. It is capable of hosting various cyber security solutions such as Next Generation Firewalls and identity-based cloaking solutions. SNOK® Network Anomaly Detection helps Siemens RUGGEDCOM RX1500 with an additional critical layer for its security application capability.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
(*)(*)(*)(*)(*)5

“Good process overview"

ABB''''s S+ Operations offers an arranged, and detailed process overview displays to present situational awareness and recognition anywhere in the water facility.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Support and service"

Rockwell Automation has been recognized for its excellent support and service for critical production equipment. The successful completion of their work made a significant contribution and deliver high quality parts on schedule.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
(*)(*)(*)(*)(*)5

“Helps in controlling security cost"

FireEye helps to identify vulnerabilities and threats through its minimally invasive Cybersecurity solutions thereby reducing the risk of advanced attacks against global organizations. It’s consulting services offer clients with customized recommendations and testing services to build a security program that meets their unique needs.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Tracking Advanced Threats"

Raytheon Foreground Security model which is V-SOC. The V-SOC model focuses on advanced threats and tracking attacker tactics, techniques, and procedures versus simple alert response. The V-SOC service identifies existing network or host compromises, zero day exploits, data exfiltration, network anomalies, emerging advanced threats, suspicious insider behaviour, use of insecure ports/protocols, and misconfigured devices.
External,
External,
(*)(*)(*)(*)(*)5

“Excellent end-point protection"

Rockwell automation provides an excellent end-point protection software(e.g.antivirus,anti-malware) which control system PCs and keep all signatures up to date
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Cyber Protection Platform and its uses"

The Industrial Cyber Protection Platform provided by Bayshore offers all the necessary tools required to defend Operational Technology (OT) infrastructure against complex attack systems, reduce cybersecurity concerns, enable the managed interconnection of industrial assets, and allow sharing of industrial data.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Highly focused and skilled"

Rockwell team is highly focused, skilled and professional. They have been successful with the work they have been awarded by delivering what was needed on time and on budget. Rockwell intrusion prevention system (IPS) inspects traffic coming from both the enterprise and external networks, and can block traffic that it determines to be malicious.
External,
External,
(*)(*)(*)(*)(*)5

“Security Testing"

The company has certified security testing which decides if items, applications, systems and associations can oppose digital security dangers. The company uses penetration testing to find potential breaches and test security to distinguish important security shortcomings and vulnerabilities
External,
External,
(*)(*)(*)(*)(*)5

“Security Assessment"

The company’s internal penetration testing and cautious evaluation of the ICS condition points of interest, including analysis of industrial systems and protocols followed by pre-approved tests demonstrated on the real system. A security assessment is done during which experts analyses the software and hardware solutions used to control the industrial process, and the systems connected to it.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Advantages of Network Segmentation"

Cyber attacks and data breaches are predictable. Thus having effective alert, containment, and mitigation processes are critical. Attacks against ICS environments  not only cause  business disruptions or financial loss, like in traditional office-based environments The purpose of network segmentation is to partition the system into different security zones and implement layers of protection that will isolate critical parts of the system by means of using policy enforcement device.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Incident response and investigation consultancy services"

Kaspersky Lab’s Industrial Systems Emergency Response Team is a project that offers wide range of information services, starting from intelligence on the latest threats and security incidents with mitigation strategies and incident response and investigation consultancy and services. In addition to the latest intelligence about threats and vulnerabilities, Kaspersky Lab’s Industrial CERT shares expertise on compliance.
External,
External,
(*)(*)(*)(*)(*)5

“Support and service"

Carbon Black solution enables enterprises of all sizes to use a DCS without overhead requirements, helping customers implement a structured approach so that the quality and control of their batch operations can be improved.
External,
External,
(*)(*)(*)(*)(*)5

“Excellent ICS security solution"

The company identifies privileged account risks by locating all privileged user and application accounts, credentials and trust relationships, including accounts associated with remote access. It reduces the risk of unauthorized access to critical systems by securing and controlling access to privileged accounts.