ENERGY AND UTILITIES

Attacks targeted on industrial systems are the biggest threats to critical infrastructure, mainly in the energy and utilities sector. This sector comprises water utilities, oil and gas distribution networks, and electric power transmission, and is largely dependent on the IT and telecommunications infrastructure for improving the efficiency and reliability of the utilities. The types of utilities listed in this segment are oil and gas pipelines network, electric power transmission, water treatment and distribution, and wastewater collection and treatment.
 

OIL AND GAS

ICS, such as SCADA and DCS, is used in oil and gas industries to monitor, manage, storage, process, and control the information generated by thousands of sensors and assets that are placed in the oil and gas plants. Sharing real-time data/information between the management and the production site has made the pipeline control systems accessible via public networks. Most of the ICS and SCADA systems deployed today have the equipment connected to Ethernet. These pipeline control systems are vulnerable to cybersecurity threats, which they are never capable of handling. With increase in the number of cyber threats, such as Stuxnet, the oil and gas companies, automation solution providers, and even the governments have been forced to develop and implement network security solutions. Companies such as ABB, Honeywell, and Siemens offer security solutions to secure oil and gas.
 

ELECTRIC POWER TRANSMISSION

The electric grid is one of the most targeted critical infrastructures in terms of cyber-attacks. The ICS and SCADA control systems help operators provide effective flow control by analyzing the network reliability, network configuration, load flow, anticipated total load, and emergency. With the introduction of new renewable energy power sources in the grid, the importance of monitoring the power transmission systems is at an all-time high. Industrial systems supervise, control, optimize, and manage the flow in the transmission systems.
 

WATER TREATMENT AND DISTRIBUTION

The total water consumption by industries is about 20%, whereas 70% is used by agriculture and 10% for domestic use. Therefore, water is one of the most essential parts of a critical infrastructure. In 2005, the Taum Sauk Water Storage Dam (Missouri, US) faced a catastrophic failure by releasing a billion gallons of water. Similarly, the seizure of water treatment facilities’ (Queensland sewage treatment plant) SCADA system in Australia resulted in the dumping of millions of gallons of water into sewage for 3 months. Water treatment plants today use VPNs and diverse firewalls to secure their industrial control networks and their extensive network infrastructure. Companies such as Emerson, Shrader Engineering, SCADAware, and Transdyn offer SCADA solutions for water utilities.
 

WASTEWATER COLLECTION AND TREATMENT

Industrial systems were introduced to the wastewater industry in the 1980s. Wastewater collection and treatment plants collect sewage water and make it environmentally safe by using specific equipment and chemicals. Many municipal wastewater systems are usually controlled and monitored by industrial systems, mainly the PLC and SCADA control systems, and operator terminals. The use of SCADA systems provides operators the necessary control to perform highly automated processes. It also enables the operator to perform the monitoring and data collection activities in a single unit. Companies such as Emerson, Revere Control Systems, Shrader Engineering, SCADAware, and Transdyn offer SCADA solutions for public utilities.

Industrial Control Systems Security Solutions in Energy and Utilities Quadrant

Comparing 98 vendors in Industrial Control Systems Security Solutions across 457 criteria.

Find the best Industrial Control Systems Security Solutions solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Industrial Control Systems Security Solutions tools.
  • Features and Functionality
    • Development Tools
      • Network traffic anomaly detection tools
      • IOC detection tools
      • Log review tools
      • Outlier analysis tools
      • Reverse engineering tools
    • Core Features
      • Control systems
      • Security standards
      • Functionality
    • Integration
      • ODVA
      • FDT – field device tool
      • EDDL - Electronic Device Description Language
  • Services
    • Pre Deployment
      • Regulatory compliance
      • Cyber attack simulation
      • Implementation
      • Design & Integration
      • Strategy consulting
    • Post Deployment
      • Support & Maintenance
      • Managed Security Services
      • Education & Training
      • Incident Response
  • Pricing
    • Per User
    • Outcome Based
    • Module Based
  • Deployment
    • Modes
      • Cloud
      • Hybrid
      • On-premise
    • Implementation Methodology
      • Risk and Threat Assessment
      • Risk/VaR Simulation
      • Risk Based Asset Classification

TOP VENDORS

  • 1

    Cisco offers ICS capabilities through its IPS Industrial Signatures solution. IPS has been established as a vulnerability mitigation technique for over a decade and can protect ICS networks against threats, regardless of whether the underlying issue is in a traditional network component or specific to ICS. Cisco’s IPS Industrial Signatures solution provides rapid-response to mitigate attacks, while also maintaining the availability and integrity of critical assets.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1984
    • $10BN to $50BN
    • 50,001 to 75,000
  • 2

    Siemens offers ICS solutions through SIRIUS, a unique, comprehensive portfolio for ICS applications. Its strength lies in its modular design, which can be easily integrated into distributed systems. SIRIUS consists of monitoring and control devices, safety systems, position and safety switches, and commanding and signaling devices. Its control systems consist of multi-processor systems that contain simple combinable function blocks, such as simple mathematics or logical operations through motion control of all linear and rotational axis.

    Read More
    • Enterprise
    • Bavaria, Germany
    • Founded: 1847
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • 3

    The ISS SCADA security solution by IBM has three main components: Intrusion Prevention Systems, SCADA Assessment Services, and IBM Managed Security Systems. IBM Proventia Network Intrusion Prevention System (IPS) has the ability to protect systems from critical vulnerabilities or attacks, while IBM Managed Security Services for clients provides outsourced solutions for comprehensive real-time security management.

    Read More
    • Enterprise
    • 1 to 50
  • 4

    Honeywell offers a vast range of ICS security products including advanced process control software, industrial flame monitoring sensors, switches and controls, automation lifecycle support services, control monitoring and safety systems, gas detection (fixed and portable), industrial wireless solutions, distributed control system, test and measurement sensors, application whitelisting and device control service, endpoint protection, industrial cybersecurity risk manager, managed industrial cyber security services, network security, and response and recovery.

    Read More
    • Enterprise
    • New Jersey, USA
    • Founded: 1906
    • $10BN to $50BN
    • 10,001 to 15,000
  • 5

    ABB offers a wide range of products under its ICS security portfolio, such as Network Manager SCADA/Distribution Management Systems (DMS), SCADA/Energy Management Systems (EMS), SCADA/Generation Management Systems (GMS), and ABB Control Systems 800xA. Its ICS security services include consulting services, maintenance services, professional services, remote monitoring services, and support services. ABB offers safe, effective, and enhanced operation of electric power systems through its SCADA/Energy Management System (EMS). EMS provides an open platform that enables smooth integration with other utility information systems while offering enhanced security levels.

    Read More
    • Enterprise
    • Zurich, Switzerland
    • Founded: 1988
    • $10BN to $50BN
    • 10,001 to 15,000
  • 6

    Trend Micro offers a security platform, Trend Micro Consumer Connect (TMCC) for the telecom industry. It protects connected home environments using a threat intelligence system (Trend Micro Smart Protection Network) that protects communications and secures devices. This platform also delivers additional integrated security services.

    Read More
    • SME
    • 1,001 to 5,000
  • 7

    Symantec provides ICS security solutions for both, operators to secure their plants and infrastructure as well as equipment vendors to increase the security of their products. Symantec’s Critical System Protection (SCSP) helps plant/infrastructure operators protect their equipment from sophisticated attacks. SCSP offers robust, signature-less, and host-based protection in managed and unmanaged scenarios, without compromising the device’s performance. Some of the key features of SCSP are application whitelisting, application specific network firewall controls, integrated host-based firewall, USB device whitelisting, auto-sandboxing, anti-exploit mitigation techniques, and deep application discovery.

    Read More
    • Enterprise
    • 1 to 50
  • 8

    Fortinet’s ICS security or SCADA solution protects ICS from advanced threats. Its appliances are highly reliable for harsh environments and compliant with Federal Information Processing Standard (FIPS) 140-2 and Common Criteria Evaluation Assurance Level (EAL) 4+. The solution is easy to deploy and manage, with tightly integrated security, networking, wireless, and admission control capabilities that can track devices and the traffic they produce.

    Read More
    • Enterprise
    • California, US
    • Founded: 2000
    • $1BN to $5BN
    • 45,001 to 50,000
  • 9

    General Electric provides ICS solutions that help improve the operational efficiency of an organization through asset optimization, enhanced process performance, and increased productivity. Prednix, a flagship product launched by the company in 2016, combines cutting-edge technology with industry experience to rapidly analyze machine-grade data and deliver faster outcomes. General Electric mainly caters to the healthcare, power generation, and manufacturing sectors. Its products are flexible and inexpensive and offer better productivity and lower risk as compared to products from its competitors.

    Read More
    • Enterprise
    • Massachusetts, USA
    • Founded: 1892
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • 10

    McAfee’s Database and Endpoint Security offers real-time protection to business-critical databases from external, internal, and intra-database exploits. The solution delivers robust security and constant compliance without the need for architecture changes, expensive hardware, or downtime.

    Read More
    • Enterprise
    • California, US
    • Founded: 1987
    • $1BN to $5BN
    • 5,001 to 10,000
  • 11

    Check Point uses security gateways, application control, unified central management, asset and anomaly detection, intrusion prevention, and secure harsh environments with 1200R to protect ICS networks from cyber attacks and malicious threats. Its 1200R solution delivers rugged, comprehensive security to most environments.

    Read More
    • Enterprise
    • Tel Aviv, Israel
    • Founded: 1993
    • $1BN to $5BN
    • 1,001 to 5,000
    • $14,490.00 - $16,181.00
  • 12

    Kaspersky Industrial CyberSecurity is a solution developed for critical infrastructures and industrial equipment. This solution combines a variety of conventional security technologies. Device access control is also included in this solution which helps customers monitor connections to portable data storage media and peripheral devices. Kaspersky Industrial CyberSecurity provides cybersecurity across all network levels.

    Read More
    • Enterprise
    • Moscow, Russia
    • Founded: 1997
    • $500MN to $1BN
    • 1,001 to 5,000
  • 13

    Belden’s Industrial Cyber Security solution portfolio safeguards and supports industrial networks, PCs, critical endpoints, and industrial controllers while simultaneously maintaining reliability in delivery, high availability, and operational resilience.

    Read More
    • SME
    • 5,001 to 10,000
  • 14

    FireEye’s solutions for critical infrastructure and ICS are in pace with industry standards and federal regulations to protect complete network environments. The company provides comprehensive solutions which protect important assets from cybersecurity threats.

    Read More
    • Enterprise
    • 1,001 to 5,000
  • 15

    Nozomi Networks offers an ICS solution called SCADAguardian. It safeguards control networks from cyber-attacks and operational disruptions by analyzing passive network traffic and rapidly detecting cyber threats. It offers real-time network visualization by improving system awareness and understanding network structure and activity. It also helps monitor network and ICS by providing comprehensive cybersecurity and reliability monitoring.

    Read More
    • Startup
    • California, US
    • Founded: 2013
    • Below $10 MN
    • 51 to 100
  • 16

    Indegy developed a cybersecurity platform that provides comprehensive visibility into the critical control plane of Operational Technology (OT) networks to identify threats that place the safety, reliability, and security of ICS at risk. The Indegy Cyber Security platform provides automated and centralized threat monitoring and anomaly detection capabilities. It enables organizations to protect their physical processes from external threats by maintaining comprehensive visibility and oversight of all the activities on OT networks anywhere in the world.

    Read More
    • Startup
    • New York, US
    • Founded: 2014
    • Below $10 MN
    • 1 to 50
  • 17

    Schneider offers an open, interoperable, and IoT-enabled platform called EcoStruxure that helps connect businesses making them efficient, sustainable, safe, and more reliable.

    • Enterprise
    • Paris, France
    • Founded: 1836
    • $10BN to $50BN
    • 1,00,001 to 5,00,000
  • 18

    Raytheon’s High Speed Guard Industrial Control System, an accredited software solution, offers highly complex, unidirectional or bi-directional automated data transfers between multiple physically segregated networks. Features such as rapid and automatic data transfer, compatibility with diverse communication systems, and low administration cost make High Speed Guard an ideal choice for production-critical systems. This solution also establishes rapid output and low-latency transfer rates.

    Read More
    • Enterprise
    • Massachusetts, USA
    • Founded: 1922
    • $101MN to $500MN
    • 10,001 to 15,000
  • 19

    Bayshore’s Industrial Cyber Protection Platform provides security against existing cyber threats and risks. It uses a Policy Engine to actively block unauthorized communications on the network, while simultaneously providing alerts to enable IT teams to take appropriate action The main advantages of the platform include logic-rich policy-based security and inspection of industrial application traffic.

    Read More
    • Startup
    • New York, US
    • Founded: 2012
    • Below $10 MN
    • 1 to 50
  • 20

    SecurityMatters provides a highly advanced threat monitoring and intelligence platform called SilentDefense that protects ICS/SCADA networks through Deep Packet Inspection (DPI) technology. The platform has a large number of ICS threat indicators that safeguard asset owners from critical cyberattacks, network errors, and operational faults.

    Read More
    • Startup
    • Brabant, Netherlands
    • Founded: 2009
    • Below $10 MN
    • 51 to 100
  • 21

    Rockwell offers a modern Distributed Control System (DCS) known as PlantPAx that seamlessly integrates critical process areas and the balance of plants into a common automation platform. The DCS connects process, discrete, power, information, and safety control into one plant-wide infrastructure. Rockwell’s PlantPAx offers a range of architecture options and scalable system capabilities.

    Read More
    • Enterprise
    • Wisconsin, US
    • Founded: 1903
    • $5BN to $10BN
    • 20,001 to 25,000
  • 22

    CyberArk provides a security solution that manages privileged access to IT environments. It is scalable and protects networks from malware threats. It also addresses vulnerabilities between IT environments, industrial control systems, and remote users. CyberArk’s Core Privileged Access Security Solution is used by many organizations to protect their digital assets.

    Read More
    • SME
    • 1,001 to 5,000
  • 23

    Claroty provides comprehensive security solutions that enable IT teams to detect, control, and protect an organization’s networks. It uses an advanced CoreX engine for its Claroty Platform specially designed for large industrial networks that can continuously monitor and analyze networks to detect vulnerabilities.

    Read More
    • Enterprise
    • New York, US
    • Founded: 2014
    • Below $10 MN
    • 101 to 500
  • 24

    Carbon Black safeguards industrial control systems from upcoming external threats without interrupting their availability. The company’s solutions follow strict regulatory compliances and ensure strict control of critical, high-risk systems.

    Read More
    • SME
    • Massachusetts, US
    • Founded: 2002
    • $51MN to $100MN
    • 501 to 1,000
  • 25

    BAE Systems offers a military-grade ICS solution called IndustrialProtect that is designed to safeguard industrial control systems against cyber attacks using cutting-edge technology across oil refineries, power plants, and manufacturing plants. IndustrialProtect is the only solution that provides all necessary security controls in a single appliance and delivers unrivaled security enforcement. BAE Systems has a strong cybersecurity portfolio that helps customers safeguard their industrial systems from cyber threats.

    Read More
    • Enterprise
    • 501 to 1,000

TOP REVIEWS

Looking for Industrial Control Systems Security Solutions? Get help
Other,Company Name Classified
Other, Company Name Classified
#8 in Industrial Control Systems Security Solutions

“Better cloud security"

(*)(*)(*)(*)(*)5
Fortinet provides the following for web security ·
  • Reduced downtime ·        
  • Simple to use ·        
  • Centralized solution for overall security         
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#9 in Industrial Control Systems Security Solutions

“Better support for different applications"

(*)(*)(*)(*)(*)5
GE offers a Predix platform and number of applications. These platforms and applications support a wide range of industries and data governance regulations.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#8 in Industrial Control Systems Security Solutions

“Highly reliable SCADA control system"

(*)(*)(*)(*)(*)5
Fortinet SCADA is a high-level industry-grade security protection solution that is highly reliable. Since it has a longer lifecycle than most solutions, it is suitable for extreme environments.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“High performance control valves"

(*)(*)(*)(*)(*)5
Control Valves offered by Honeywell is designed for harsh conditions in industries such as oil & gas, power, and others. These valves have a long life and provide high performance and can also easily maintained.
Other,Company Name Classified
Other, Company Name Classified
#8 in Industrial Control Systems Security Solutions

“Perfect security solution"

(*)(*)(*)(*)(*)5
Fortinet’s solution perfectly fits requirements for a strong, reliable signal strength, despite the concrete building of the hotel it was used in.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Excellent access control offering"

(*)(*)(*)(*)(*)5
Honeywell offers standalone web-hosted access control and single door access control to integrated systems which can manage a number of doors and alarm monitoring points.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Up to date threat intelligence platform"

(*)(*)(*)(*)(*)5
IBM X-Force security experts search and respond to threats and use the latest threat intelligence to prevent breaches.
Other,Company Name Classified
Other, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Easy integration"

(*)(*)(*)(*)(*)5
Experion provided by Honeywell allows computer operators to create applications, which can be written in C/C++ and can run on the server. Libraries of functions, header files, and sample source programs are included in the API Library to help computer operators create applications.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“Rapid response to cyber incidents"

(*)(*)(*)(*)(*)5
Checkpoint helps manufacturers identify anomalies in operating environments so that malware attacks and other threats can be mitigated and the integrity of critical operational data can be maintained. It is capable of assessing the security posture of ICS networks, safeguarding critical systems, controlling access to network assets, and monitoring & detecting vulnerabilities and threats. It also investigates and resolves issues when they occur.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Good Efficiency"

(*)(*)(*)(*)(*)5
Safety & security management of an industrial facility gets transformed from an operational function into a driver of business continuity and efficiency with the help of Honeywell Command and Control Suite. It helps reduce business risks within an industrial facility with integrated incident workflow, easy access to data, and contextual awareness.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“Comprehensive database security"

(*)(*)(*)(*)(*)5
The Check Point 1200R is a rugged solution that provides complete security, unified visibility, and best practices for compliance all combined in one product. It does all this but does not leave a large footprint, which makes it easy to incorporate into any environment.
Internal Analyst,MnM
Internal Analyst, MnM
#9 in Industrial Control Systems Security Solutions

“Advanced threat and vulnerability intelligence services"

(*)(*)(*)(*)(*)5
GE offers digital threat and vulnerability intelligence services. These services provide advanced insights into the attack surface landscape. These services ensure actionable intelligence for OT customers.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#9 in Industrial Control Systems Security Solutions

“Good authentication process"

(*)(*)(*)(*)(*)5
GE secure access to the controller is implemented using an authentication the process that does not require passwords to be passed over the network. This helps prevent an attacker from eavesdropping and collecting credentials from the network that would provide unauthorized access to the controller.
Other,Company Name Classified
Other, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Better implementation of Standard Operating Procedures (SOPs)"

(*)(*)(*)(*)(*)5
Experion Industrial Security provided by Honeywell allows users to link Standard Operating Procedures (SOPs) to multiple locations.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“World class Intrusion Prevention System"

(*)(*)(*)(*)(*)5
Check Point IPS (Intrusion Prevention System) is a combination of IPS protection and exceptional performance. It is less expensive than conventional, stand-alone IPS software solutions. IPS can carry out proactive intrusion prevention through its unified and extensible Next Generation Firewall.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#9 in Industrial Control Systems Security Solutions

“Best managed services"

(*)(*)(*)(*)(*)5
GE Industrial Managed Services are mainly designed for post-implementation or project deployment. These services help train the right people and develop processes that are required to capitalize on the value of GE Digital solutions.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“Excellent control system"

(*)(*)(*)(*)(*)5
Checkpoint secures Industrial Control Systems by using advanced IT threat prevention; separating IT from OT through the enforcement of access rights; by deploying advanced ICS and SCADA security technologies.
Other,Company Name Classified
Other, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Integrated enterprise security"

(*)(*)(*)(*)(*)5
IBM provides integrated enterprise security products and services. IBM X-Force research and development support the portfolio of these products and services.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#8 in Industrial Control Systems Security Solutions

“Capable of handling high traffic spikes"

(*)(*)(*)(*)(*)5
Fortinet delivers solutions that are capable of handling traffic spikes from a large population, delivering close to 10Gbps of web filtering (including encrypted traffic), and becoming responsive and strategic over time.
Other,Company Name Classified
Other, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Best security intelligence"

(*)(*)(*)(*)(*)5
IBM Cloud uses security analytics to detect and respond to threats faster. It monitors and gains security intelligence in hybrid cloud deployment.