Compare Top Industrial Control Systems Security Solutions

Get to know the strength and weaknesses of top vendors in Industrial Control Systems Security Solutions market. Compare vendors against their competitors on the basis of criteria, the scores of which are derived by ratings from buyers, industry experts, MnM analysts and vendors. Set comparison preferences option allows you to decide features which are important to you and evaluate vendors considering them as your parameters.

EVALUATION CRITERIA

3.92
3.7
3.65
  • Regulatory compliance for ICS

  • Minimize risk - backup and recovery

  • Asset visibility and safety / Real-time monitoring

  • Lower TCO

  • Integration of legacy devices

  • Increased productivity / improve system performance

  • Security automation / central management

  • Secure remote access

  • Avoid shutdowns

  • Predictive cybersecurity

  • Network segmentation

  • Control system modernization / IT-OT consolidation

  • Feature and Functionality

    • Types of Security

      Cloud Security | Network Security | Endpoint Security | Database Security | Application Security | Web Security |
    • Product Features

    • API Integration

    • Anomaly Detection

    • Access Management

    • Backup & Recovery

    • Authentication

    • Asset Management

    • Data Compliance

    • Content Filtering

    • Complaince Administration

    • Incident Logs

    • Incident Forensics

    • Endpoint Intelligence

    • Proactive Alerts

    • Policy Enforcement

    • Intelligence Reports

    • Security Monitoring

    • Security Code Analysis

    • Security Auditing

    • User Analytics

    • Security Workflow Automation

    • Security orchestration

    • Workload Protection

    • Web Control

    • Vulnerability Assessment

    • Intrusion Prevention

    • Development Tools

      Network traffic anomaly detection tools | IOC detection tools | Log review tools | Outlier analysis tools | System artifact review tools | Reverse engineering tools | Multi-purpose tools |
    • Core Features

      Control systems | Security standards | Functionality |
    • Integration

      ODVA | FDT – field device tool | EDDL - Electronic Device Description Language |
  • Breadth and Depth of Product Offerings

    • Products/Solutions Offered

    • licenses

    • Encryption 

    • Solutions Offered

      Scada Encryption | Virtualization Security | Control Valves | Threat Isolation | Others | Security and Vulnerability Management  | Programmable Logic Controllers |
    • Security Patch Management

    • Security Configuration Management 

    • Biometrics

  • Scalability

    • Number of End Users

    • End User Organization Size

  • Use Cases

    • Integration of legacy devices

    • Increased productivity / improve system performance

    • Minimize risk - backup and recovery

    • Lower TCO

    • Asset visibility and safety / Real-time monitoring

    • Security automation / central management

    • Secure remote access

    • Avoid shutdowns

    • Predictive cybersecurity

    • Network segmentation

    • Control system modernization / IT-OT consolidation

    • Regulatory compliance for ICS

  • Services

    • Risk Management Services

    • Other Services

      Support and Services |
    • Audit And Reporting

    • Pre Deployment

      Regulatory compliance | Cyber attack simulation | Implementation | Design & Integration | Strategy consulting |
    • Post Deployment

      Support & Maintenance | Managed Security Services | Education & Training | Incident Response |
  • Pricing

    • Per User

    • Per Node/Asset

    • Outcome Based

    • Module Based

    • As a Service

  • Deployment

    • Modes

      Cloud | Hybrid | On-premise |
    • Implementation Methodology

      Risk and Threat Assessment | Software Enabled Methodology | Risk/VaR Simulation | Risk Based Asset Classification | Delivery |
  • Geographic Footprint

    • Sales Offices/Development Centers -North America

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Offices/Development Centers -Europe

    • Sales Offices/Development Centers -Asia-Pacific

    • Sales Offices/Development Centers -Middle East and Africa

    • Sales Offices/Development Centers -Latin America

    • Channel Partners - North America

    • Channel Partners - Europe

    • Channel Partners - Middle East and Africa

    • Channel Partners - Asia-Pacific

    • Channel Partners - Latin America

  • Breadth of Applications Served

    • Tailor-made/customized Solutions

    • % Revenue from Industry Verticals

      Revenue - Transportation and Logistics | Revenue - Other Industry Verticals | Revenue - Energy and Utilities | Revenue - Energy and Power | Revenue - Energy and Chemicals |
    • Industry Vertical Addition

    • Industry Vertical

  • Vision Alignment

    • Number of Customers Catered

    • New Product Developments

    • R&D Spend

      5% - 10% | < 5% | > 20% | 15% - 20% | 10% - 15% |
    • Number of Patents

  • Financial Strength

    • Profitability

    • Last Financial Year Revenue

      > USD 50 billion | USD 500 - 1000 million | USD 250 - 500 million | USD 1 - 10 billion | USD 10 - 50 billion | < USD 100 million | USD 100 - 250 million |
    • Forecasted Revenue Growth Rate

    • % Revenue from Applications

      Revenue - North America | Revenue - Middle East and Africa | Revenue - Latin America | Revenue - Europe | Revenue - Asia-Pacific |
  • Mergers and Acquisitions Strategy

    • M&A

    • Joint Ventures

    • Partnership and Collaborations

  • Sector Footprint

    • Transportation and Logistics

    • Manufacturing

    • Energy and Utilities

    • Other Industry Verticals

    • Energy and Power

  • Partner Ecosystem

    • System Integrators

    • Implementation Partners

    • Talent Availability

  • Total Funding Amount

  • Revenue

  • Funding Status