EUROPE
The European region is the second-largest market for cybersecurity, after North America. The growing need for strong security measures and compliance management, owing to the increase in internet usage and online applications for ICS, have made the European market more lucrative for vendors delivering ICS security solutions. European manufacturers are paying more attention to operational efficiency due to competition from low-cost manufacturing companies in regions, such as China. The European Union (EU) is taking multiple initiatives to ensure cybersecurity across all major European countries. The EU’s digital agenda has already set out 14 major actions for the improvement of cybersecurity-readiness, which includes actions for reinforcing network and information security policy, and establishment of a well-functioning network of Computer Emergency Response Teams (CERT). Recently, the European countries announced plans to invest around USD 1.36 billion in defense against cyber-attacks. Similarly, the UK government has also decided to invest around USD 2.1 billion over the next five years to enhance cybersecurity. In February 2014, the EU allocated USD 96.54 million for online safety projects under the commission’s 2020 Research Program. Furthermore, SMEs across the region has faced a number of cyber-attacks in recent years and hence, investments in ICS security solutions, such as DDoS, UTM, and SIEM are expected to grow at a rapid pace in the future. ABB has signed a contract for the 1,850 km Trans- Anatolian Natural Gas Pipeline (TANAP) project which will supply natural gas straight to Europe. The UK government has estimated that around 90% of large organizations and around 70% of small organizations have suffered from data breaches between 2014 and 2015. The major security vendors operating in Europe include Atos, Cassidian, and Thales Group.

TOP VENDORS
In Industrial Control Systems Security Solutions

  1. CISCO SYSTEMS
    Reviews
    3.9
  2. SIEMENS AG
    Reviews
    3.7
  3. IBM CORPORATION
    Reviews
    3.6

Industrial Control Systems Security Solutions Quadrant

Comparing [object Object] vendors in Industrial Control Systems Security Solutions across 377 criteria.

Find the best Industrial Control Systems Security Solutions solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Industrial Control Systems Security Solutions tools.
Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Features and Functionality
2.65
2.90
1.30
Services
2.85
3.85
2.45
Pricing
0.90
0.00
2.10
Deployment
3.45
3.90
3.60
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • Cisco offers ICS capabilities through its IPS Industrial Signatures solution. IPS has been established as a vulnerability mitigation technique for over a decade and can protect ICS networks against threats, regardless of whether the underlying issue is in a traditional network component or specific to ICS. Cisco’s IPS Industrial Signatures solution provides rapid-response to mitigate attacks, while also maintaining the availability and integrity of critical assets.

    BUYERS
    VENDORS
    EXPERTS
    3.9
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1984
    • S10BN to $50BN
    • 50,001 to 75,000
  • Siemens offers ICS solutions through SIRIUS, a unique, comprehensive portfolio for ICS applications. Its strength lies in its modular design, which can be easily integrated into distributed systems. SIRIUS consists of monitoring and control devices, safety systems, position and safety switches, and commanding and signaling devices. Its control systems consist of multi-processor systems that contain simple combinable function blocks, such as simple mathematics or logical operations through motion control of all linear and rotational axis.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.7
    ANALYSTS
     
    • Enterprise
    • Bavaria, Germany
    • Founded: 1847
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • The ISS SCADA security solution by IBM has three main components: Intrusion Prevention Systems, SCADA Assessment Services, and IBM Managed Security Systems. IBM Proventia Network Intrusion Prevention System (IPS) has the ability to protect systems from critical vulnerabilities or attacks, while IBM Managed Security Services for clients provides outsourced solutions for comprehensive real-time security management.

    BUYERS
    VENDORS
    EXPERTS
    3.6
    ANALYSTS
     
    • Enterprise
    • New York, US
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Honeywell offers a vast range of ICS security products including advanced process control software, industrial flame monitoring sensors, switches and controls, automation lifecycle support services, control monitoring and safety systems, gas detection (fixed and portable), industrial wireless solutions, distributed control system, test and measurement sensors, application whitelisting and device control service, endpoint protection, industrial cybersecurity risk manager, managed industrial cyber security services, network security, and response and recovery.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.5
    ANALYSTS
     
    • Enterprise
    • New Jersey, US
    • Founded: 1906
    • S10BN to $50BN
    • 10,001 to 15,000
  • ABB offers a wide range of products under its ICS security portfolio, such as Network Manager SCADA/Distribution Management Systems (DMS), SCADA/Energy Management Systems (EMS), SCADA/Generation Management Systems (GMS), and ABB Control Systems 800xA. Its ICS security services include consulting services, maintenance services, professional services, remote monitoring services, and support services. ABB offers safe, effective, and enhanced operation of electric power systems through its SCADA/Energy Management System (EMS). EMS provides an open platform that enables smooth integration with other utility information systems while offering enhanced security levels.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.5
    ANALYSTS
     
    • Enterprise
    • Zurich, Switzerland
    • Founded: 1988
    • S10BN to $50BN
    • 10,001 to 15,000
  • Trend Micro offers a security platform, Trend Micro Consumer Connect (TMCC) for the telecom industry. It protects connected home environments using a threat intelligence system (Trend Micro Smart Protection Network) that protects communications and secures devices. This platform also delivers additional integrated security services.

    BUYERS
    VENDORS
    EXPERTS
    3.4
    ANALYSTS
     
    • SME
    • Tokyo, Japan
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • Symantec provides ICS security solutions for both, operators to secure their plants and infrastructure as well as equipment vendors to increase the security of their products. Symantec’s Critical System Protection (SCSP) helps plant/infrastructure operators protect their equipment from sophisticated attacks. SCSP offers robust, signature-less, and host-based protection in managed and unmanaged scenarios, without compromising the device’s performance. Some of the key features of SCSP are application whitelisting, application specific network firewall controls, integrated host-based firewall, USB device whitelisting, auto-sandboxing, anti-exploit mitigation techniques, and deep application discovery.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.2
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • Fortinet’s ICS security or SCADA solution protects ICS from advanced threats. Its appliances are highly reliable for harsh environments and compliant with Federal Information Processing Standard (FIPS) 140-2 and Common Criteria Evaluation Assurance Level (EAL) 4+. The solution is easy to deploy and manage, with tightly integrated security, networking, wireless, and admission control capabilities that can track devices and the traffic they produce.

    BUYERS
    VENDORS
    EXPERTS
    3.1
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 2000
    • $1BN to $5BN
    • 45,001 to 50,000
  • General Electric provides ICS solutions that help improve the operational efficiency of an organization through asset optimization, enhanced process performance, and increased productivity. Prednix, a flagship product launched by the company in 2016, combines cutting-edge technology with industry experience to rapidly analyze machine-grade data and deliver faster outcomes. General Electric mainly caters to the healthcare, power generation, and manufacturing sectors. Its products are flexible and inexpensive and offer better productivity and lower risk as compared to products from its competitors.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.0
    ANALYSTS
     
    • Enterprise
    • Massachusetts, US
    • Founded: 1892
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • McAfee’s Database and Endpoint Security offers real-time protection to business-critical databases from external, internal, and intra-database exploits. The solution delivers robust security and constant compliance without the need for architecture changes, expensive hardware, or downtime.

    BUYERS
    VENDORS
    EXPERTS
    2.8
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1987
    • $1BN to $5BN
    • 5,001 to 10,000
  • Check Point uses security gateways, application control, unified central management, asset and anomaly detection, intrusion prevention, and secure harsh environments with 1200R to protect ICS networks from cyber attacks and malicious threats. Its 1200R solution delivers rugged, comprehensive security to most environments.

    BUYERS
    VENDORS
    EXPERTS
    2.8
    ANALYSTS
     
    • Enterprise
    • Tel Aviv, Israel
    • Founded: 1993
    • $1BN to $5BN
    • 1,001 to 5,000
    • $14,490.00 - $16,181.00
  • Kaspersky Industrial CyberSecurity is a solution developed for critical infrastructures and industrial equipment. This solution combines a variety of conventional security technologies. Device access control is also included in this solution which helps customers monitor connections to portable data storage media and peripheral devices. Kaspersky Industrial CyberSecurity provides cybersecurity across all network levels.

    BUYERS
    VENDORS
    EXPERTS
    2.7
    ANALYSTS
     
    • Enterprise
    • Moscow, Russia
    • Founded: 1997
    • $500MN to $1BN
    • 1,001 to 5,000
  • Belden’s Industrial Cyber Security solution portfolio safeguards and supports industrial networks, PCs, critical endpoints, and industrial controllers while simultaneously maintaining reliability in delivery, high availability, and operational resilience.

    BUYERS
    VENDORS
    EXPERTS
    2.7
    ANALYSTS
     
    • SME
    • Missouri, US
    • $101MN to $500MN
    • 5,001 to 10,000
  • The visibility, analytics, and automation delivered through Rapid7’s Insight Cloud help security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.

    BUYERS
    VENDORS
    EXPERTS
    2.7
    ANALYSTS
     
    • SME
    • Massachusetts, US
    • Founded: 2000
    • $101MN to $500MN
    • 501 to 1,000
  • FireEye’s solutions for critical infrastructure and ICS are in pace with industry standards and federal regulations to protect complete network environments. The company provides comprehensive solutions which protect important assets from cybersecurity threats.

    BUYERS
    VENDORS
    EXPERTS
    2.6
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 2004
    • $500MN to $1BN
    • 1,001 to 5,000
  • Nozomi Networks offers an ICS solution called SCADAguardian. It safeguards control networks from cyber-attacks and operational disruptions by analyzing passive network traffic and rapidly detecting cyber threats. It offers real-time network visualization by improving system awareness and understanding network structure and activity. It also helps monitor network and ICS by providing comprehensive cybersecurity and reliability monitoring.

    BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Startup
    • California, US
    • Founded: 2013
    • Below $10 MN
    • 51 to 100
  • Corero’s product Corero SmartWall Threat Defense System (TDS) protects network infrastructure, online services, and confidential data from DDoS attacks. The Corero technology is at par with industry standards on all fronts. Corero provides a comprehensive solution, in a good network design natural “collapsed inspection points” are built inherently by the devices that provide the segmentation between the different levels. Instead of deploying first- or even next-generation firewall technology between the levels, transparent inspection technology is imperative to protect against the wide array of electronic threats facing ICS components today.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    2.4
    ANALYSTS
     
    • Startup
    • Massachusetts, US
    • 501 to 1,000
  • Schneider offers an open, interoperable, and IoT-enabled platform called EcoStruxure that helps connect businesses making them efficient, sustainable, safe, and more reliable.

    BUYERS
    VENDORS
    EXPERTS
    2.3
    ANALYSTS
     
    • Enterprise
    • Paris, France
    • Founded: 1836
    • S10BN to $50BN
    • 1,00,001 to 5,00,000
  • Northrop Grumman offers a SPUDS (SCADA Protocol Unique Digital Signature) tool that monitors and protects Industrial Control Systems (ICS) against malicious activity. The tool is a combination of both, software and hardware components that monitors an organization’s network continuously for the detection of insider threats and anomalous and malicious code.

    BUYERS
    VENDORS
    EXPERTS
    2.2
    ANALYSTS
     
    • Enterprise
    • Virginia, US
    • Founded: 1994
    • S10BN to $50BN
    • 75,001 to 1,00,000
  • Raytheon’s High Speed Guard Industrial Control System, an accredited software solution, offers highly complex, unidirectional or bi-directional automated data transfers between multiple physically segregated networks. Features such as rapid and automatic data transfer, compatibility with diverse communication systems, and low administration cost make High Speed Guard an ideal choice for production-critical systems. This solution also establishes rapid output and low-latency transfer rates.

    BUYERS
    VENDORS
    EXPERTS
    2.2
    ANALYSTS
     
    • Enterprise
    • Massachusetts, US
    • Founded: 1922
    • S10BN to $50BN
    • 50,001 to 75,000
  • Darktrace offers Darktrace Enterprise, an artificial intelligence cyber defense solution that uses AI and ML to protect networks, and Darktrace Industrial, a specially designed offering used to identify threats and vulnerabilities in SCADA systems and IT networks as it major offerings. In addition to these solutions, it also offers Darktrace Cloud, Darktrace SaaS, and Darktrace Antigena. The company has adapted innovative mathematical models to ICS data for machines, networks, and users within environments, which spots previously unidentified anomalies in real-time.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    2.1
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2013
    • $11MN to $50MN
    • 501 to 1,000
  • Rockwell offers a modern Distributed Control System (DCS) known as PlantPAx that seamlessly integrates critical process areas and the balance of plants into a common automation platform. The DCS connects process, discrete, power, information, and safety control into one plant-wide infrastructure. Rockwell’s PlantPAx offers a range of architecture options and scalable system capabilities.

    BUYERS
    VENDORS
    EXPERTS
    2.1
    ANALYSTS
     
    • Enterprise
    • Wisconsin, US
    • Founded: 1903
    • $5BN to $10BN
    • 20,001 to 25,000
  • CyberArk provides a security solution that manages privileged access to IT environments. It is scalable and protects networks from malware threats. It also addresses vulnerabilities between IT environments, industrial control systems, and remote users. CyberArk’s Core Privileged Access Security Solution is used by many organizations to protect their digital assets.

    BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • SME
    • Massachusetts, USA
    • Founded: 1999
    • $101MN to $500MN
    • 1,001 to 5,000
  • Dell is a major technology driven company providing a computing platform for the outdoors. The company provides a security solution that can be deployed in any outside situation without changing the present power connectivity.

    BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • Enterprise
    • Texas, US
    • Founded: 1984
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Positive Technologies' ICS security portfolio consists of 2 products, namely, MaxPatrol for vulnerability and compliance management, and PT ISIM for cyber threat detection and incident response. It also provides ICS/SCADA security assessment and forensic investigation services.

    BUYERS
    VENDORS
    EXPERTS
    1.9
    ANALYSTS
     
    • Enterprise
    • Framingham, Massachusetts, US
    • Founded: 2000
    • $51MN to $100MN
    • 1 to 50
  • Dragos’ Worldview is a dedicated ICS intelligence offering in the marketplace that provides defenders with contextual reports and IOC’s to further illuminate adversarial behavior and enable appropriate detection and preventative measures. Its Threat Operations Center includes services such as threat hunting and incident response and training.

    BUYERS
    VENDORS
    EXPERTS
    1.7
    ANALYSTS
     
    • Enterprise
    • Maryland, US
    • Founded: 2016
    • Below $10 MN
    • 51 to 100
  • Akamai offers security services to protect websites, mobile infrastructure, and APIs. These services are trusted by various asset managing companies, insurance companies, and financial technology companies.

    BUYERS
    VENDORS
    EXPERTS
    1.7
    ANALYSTS
     
    • Enterprise
    • Massachusetts, US
    • Founded: 1998
    • $1BN to $5BN
    • 5,001 to 10,000
  • Airbus offers ICS solutions such as ICS Security Risk Analysis and ICS Security Maturity Check. Airbus’ ICS solutions help customers uncover weaknesses and flaws in their industrial systems. ICS Security Risk Analysis helps customers with document analysis, risk analysis, data analysis, reporting, and risk evaluation.

    BUYERS
    VENDORS
    EXPERTS
    1.4
    ANALYSTS
     
    • Enterprise
    • Leiden, Netherlands
    • Founded: 1970
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • BAE Systems offers a military-grade ICS solution called IndustrialProtect that is designed to safeguard industrial control systems against cyber attacks using cutting-edge technology across oil refineries, power plants, and manufacturing plants. IndustrialProtect is the only solution that provides all necessary security controls in a single appliance and delivers unrivaled security enforcement. BAE Systems has a strong cybersecurity portfolio that helps customers safeguard their industrial systems from cyber threats.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    1.1
    ANALYSTS
     
    • Enterprise
    • London, England
    • Founded: 1999
    • 501 to 1,000
  • BeyondTrust provides privileged access management to protect data breaches associated with stolen credentials, misused privileges, and compromised remote access. Platforms supported by BeyondTrust’s offerings include the endpoint, server, cloud, DevOps, and network device environments.

    BUYERS
    VENDORS
    EXPERTS
    1.0
    ANALYSTS
     
    • SME
    • Arizona, US
    • Founded: 1985
    • $101MN to $500MN
    • 501 to 1,000
  • Radware is a leader in application delivery and cybersecurity solutions for virtual, cloud, and software-defined data centers. Its award-winning solutions deliver service-level assurance for business-critical applications while maximizing IT efficiency. Radware solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity, and achieve maximum productivity while keeping costs down. DDoS protection, web application firewall, application delivery, and load balancing solutions optimize business operations, minimize service delivery degradation, and prevent downtime.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    0.1
    ANALYSTS
     
    • SME
    • Tel Aviv, Israel
    • Founded: 1996
    • $101MN to $500MN
    • 501 to 1,000
  • Emerson offers control & safety systems for efficient manufacturing processes through its automation solutions segment. The company offers industry-specific services such as consulting, project management, and maintenance.

    BUYERS
    VENDORS
    EXPERTS
    0.0
    ANALYSTS
     
    • Enterprise
    • Missouri, US
    • Founded: 1890
    • S10BN to $50BN
    • 50,001 to 75,000

POTENTIAL BUYERS AND THEIR PROBLEMS

 
#Company Name Classified is tagged in this problem 6:27 AM 16 Apr,19
Project Manager,Company Name Classified
Buyer, Telecom Infrastructure, SME Global Head - Service and Product Development, Company Name Classified

We are telecom infrastructure provider company spanning across two continents. Recently we have inst ...Read More

#Company Name Classified is tagged in this problem 6:26 AM 16 Apr,19
Project Manager,Company Name Classified
Buyer, Food Manufacturing, Enterprise Project Manager, Company Name Classified

We are one of the growing Food Manufacturing company in Asia Pacific. In last 5 years we have expand ...Read More

#Company Name Classified is tagged in this problem 8:22 AM 10 Apr,19
Project Manager,Company Name Classified
Buyer, Automotive, Enterprise Vice President, Company Name Classified

A automobile manufacturing plant is seeking an solution to protect its manufacturing unit from the v ...Read More

#Company Name Classified is tagged in this problem 8:19 AM 10 Apr,19
Project Manager,Company Name Classified
Buyer, Automotive, Enterprise Vice President, Company Name Classified

A heavy vehicle manufacturing company wants improvement in its network security. The company was fac ...Read More

#Company Name Classified is tagged in this problem 7:27 AM 10 Apr,19
Project Manager,Company Name Classified
Buyer, Telecom Infrastructure, SME Global Head - Service and Product Development, Company Name Classified

A telecom company in APAC wants to have an extreme visibility, vulnerability monitoring, and deep in ...Read More

#Company Name Classified is tagged in this problem 7:18 AM 10 Apr,19
Project Manager,Company Name Classified
Buyer, Oil and Gas, Enterprise Global Head - Service and Product Development, Company Name Classified

A refinery in France is looking for an advanced cyber security solution to protect the petrochemical ...Read More

#Company Name Classified is tagged in this problem 7:16 AM 10 Apr,19
Project Manager,Company Name Classified
Buyer, Oil and Gas, Enterprise Global Head - Service and Product Development, Company Name Classified

We are a large petroleum refinery in the Middle East region wanted to review its existing cyber secu ...Read More

Questions & Answers

TOP REVIEWS

Looking for Industrial Control Systems Security Solutions? Get help
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Excellent network security services"

(*)(*)(*)(*)(*)5
IBM Cloud offer network security services to safeguard workloads from network threats. IBM experts guide and provide knowledge in physical security and network isolation and protection to implement a network security solution, thereby secure information assets in a cost-effective manner.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Excellent access control offering"

(*)(*)(*)(*)(*)5
Honeywell offers standalone web-hosted access control and single door access control to integrated systems which can manage a number of doors and alarm monitoring points.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#9 in Industrial Control Systems Security Solutions

“Good authentication process"

(*)(*)(*)(*)(*)5
GE secure access to the controller is implemented using an authentication the process that does not require passwords to be passed over the network. This helps prevent an attacker from eavesdropping and collecting credentials from the network that would provide unauthorized access to the controller.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#9 in Industrial Control Systems Security Solutions

“Best managed services"

(*)(*)(*)(*)(*)5
GE Industrial Managed Services are mainly designed for post-implementation or project deployment. These services help train the right people and develop processes that are required to capitalize on the value of GE Digital solutions.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“Rapid response to cyber incidents"

(*)(*)(*)(*)(*)5
Checkpoint helps manufacturers identify anomalies in operating environments so that malware attacks and other threats can be mitigated and the integrity of critical operational data can be maintained. It is capable of assessing the security posture of ICS networks, safeguarding critical systems, controlling access to network assets, and monitoring & detecting vulnerabilities and threats. It also investigates and resolves issues when they occur.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“World class Intrusion Prevention System"

(*)(*)(*)(*)(*)5
Check Point IPS (Intrusion Prevention System) is a combination of IPS protection and exceptional performance. It is less expensive than conventional, stand-alone IPS software solutions. IPS can carry out proactive intrusion prevention through its unified and extensible Next Generation Firewall.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“High performance control valves"

(*)(*)(*)(*)(*)5
Control Valves offered by Honeywell is designed for harsh conditions in industries such as oil & gas, power, and others. These valves have a long life and provide high performance and can also easily maintained.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“Comprehensive database security"

(*)(*)(*)(*)(*)5
The Check Point 1200R is a rugged solution that provides complete security, unified visibility, and best practices for compliance all combined in one product. It does all this but does not leave a large footprint, which makes it easy to incorporate into any environment.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Good Efficiency"

(*)(*)(*)(*)(*)5
Safety & security management of an industrial facility gets transformed from an operational function into a driver of business continuity and efficiency with the help of Honeywell Command and Control Suite. It helps reduce business risks within an industrial facility with integrated incident workflow, easy access to data, and contextual awareness.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Faster threat response"

(*)(*)(*)(*)(*)5
Monitoring and logging solutions are developed and deployed for all ICS applications and infrastructure. These solutions use proactive measures to help provide faster response to threats and prevent attacks.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#9 in Industrial Control Systems Security Solutions

“Better support for different applications"

(*)(*)(*)(*)(*)5
GE offers a Predix platform and number of applications. These platforms and applications support a wide range of industries and data governance regulations.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Up to date threat intelligence platform"

(*)(*)(*)(*)(*)5
IBM X-Force security experts search and respond to threats and use the latest threat intelligence to prevent breaches.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“Efficient SCADA control system"

(*)(*)(*)(*)(*)5
The network and controls of Checkpoint SCADA are capable of managing networks efficiently. Its implementation is proprietary and helps in the collection and analysis of data.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#11 in Industrial Control Systems Security Solutions

“Excellent control system"

(*)(*)(*)(*)(*)5
Checkpoint secures Industrial Control Systems by using advanced IT threat prevention; separating IT from OT through the enforcement of access rights; by deploying advanced ICS and SCADA security technologies.
Other,Company Name Classified
Other, Company Name Classified
#8 in Industrial Control Systems Security Solutions

“Better cloud security"

(*)(*)(*)(*)(*)5
Fortinet provides the following for web security ·
  • Reduced downtime ·        
  • Simple to use ·        
  • Centralized solution for overall security         
Other,Company Name Classified
Other, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Easy integration"

(*)(*)(*)(*)(*)5
Experion provided by Honeywell allows computer operators to create applications, which can be written in C/C++ and can run on the server. Libraries of functions, header files, and sample source programs are included in the API Library to help computer operators create applications.
Other,Company Name Classified
Other, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Best security intelligence"

(*)(*)(*)(*)(*)5
IBM Cloud uses security analytics to detect and respond to threats faster. It monitors and gains security intelligence in hybrid cloud deployment.
Other,Company Name Classified
Other, Company Name Classified
#3 in Industrial Control Systems Security Solutions

“Integrated enterprise security"

(*)(*)(*)(*)(*)5
IBM provides integrated enterprise security products and services. IBM X-Force research and development support the portfolio of these products and services.
Other,Company Name Classified
Other, Company Name Classified
#4 in Industrial Control Systems Security Solutions

“Better implementation of Standard Operating Procedures (SOPs)"

(*)(*)(*)(*)(*)5
Experion Industrial Security provided by Honeywell allows users to link Standard Operating Procedures (SOPs) to multiple locations.
Internal Analyst,MnM
Internal Analyst, MnM
#9 in Industrial Control Systems Security Solutions

“Advanced threat and vulnerability intelligence services"

(*)(*)(*)(*)(*)5
GE offers digital threat and vulnerability intelligence services. These services provide advanced insights into the attack surface landscape. These services ensure actionable intelligence for OT customers.