KASPERSKY LAB in Industrial Control Systems Security Solutions

The company offers the following products in the ICS security market:

  • Anomaly Detection
  • Integrity Control
  • Antimalware
  • Firewall and IPS
  • Application Control
  • Centralized Management
  • Forensic Tools

The company offers the following services in the ICS security market:

Education and Intelligence

  • Cybersecurity Training
  • Awareness Programs
  • Intelligence Reporting

Expert Services

  • Cybersecurity Assessment
  • Solution Integration
  • Incident Response

Kaspersky Industrial CyberSecurity for Nodes

KICS for Nodes explicitly addresses dangers at administrator level in ICS conditions. It verifies ICS/SCADA servers, HMIs, and designing workstations from the different kinds of cyber threats that can result from human elements, conventional malware, and directed assaults or damage.

Uprightness control innovations highlighted in KICS for Nodes include:

  • Control of utilization establishment and start-up as indicated by whitelisting (best practice for mechanical control organizes) or boycotting arrangements
  • Control of utilization access to working framework assets: records, envelopes, and framework library
  • Control of a wide range of executable running in Windows conditions, including .exe, .dll, .ocx, drivers, ActiveX, contents, direction line translators, and part mode drivers
  • Updating utilization notoriety information
  • Pre-characterized and client characterized application classifications to oversee controlled application records
  • Fine-tuning of utilization controls for various clients
  • Prevention or location just modes: obstructing any application that isn't whitelisted or, in 'watching' mode, permitting applications which aren't whitelisted to run

Device Control

Based on family, device category, and specific device ID, management of access to removable devices, peripherals, and system busses.

  • Support for both whitelisting and blacklisting approaches
  • Granular, per-computer, and per-user policy assignment to a single user or a group of users.
  • Prevention or detection-only mode

Host-based Firewall

Some of the key functionalities:

  • Restricted ports and networks can be accessed.
  • Discovery and blocking of network attacks launched from internal sources which may introduce malware that can scan and infect the host.

Wi-Fi Network Control

Connectivity to any unauthorized Wi-Fi networks can be monitored. Based on Default Deny technology, the Wi-Fi Control task is blocks connections to any Wi-Fi network in the task settings.

PLC Respectability Check

This empowers extra command over PLC arrangements by periodical checks against a chose, Kaspersky Lab-verified server. The subsequent checksums are looked at against spared 'Etalon' values, and any deviations are accounted for.

Document Integrity Monitor

This element is intended to follow activities performed inside determined records and organizers in the checking extensions indicated in the assignment settings. It can be utilized to recognize document changes that may show a security rupture on the ensured server – like changes to SCADA ventures put away on a SCADA server.

Advanced Anti-malware Protection

Kaspersky Lab’s proactive malware detection and prevention technologies are improved and re-designed to meet heavy resource consumption and system availability requirements. Advanced anti-malware protection is designed to work effectively in a static environment. Some of the technologies offered by the Kaspersky Lab:

  • Signature-based malware detection
  • On-access and on-demand detection
  • In-memory (resident) detection
  • Ransomware detection via special Anti-Cryptor technology
  • Kaspersky Security Network (KSN) and Kaspersky Private Security Network (KPSN), enabling the ultimate malware detection service

Trusted Updates

There is no impact of Kaspersky Lab security updates on the availability of the protected system when compatibility checks are performed before both database/component releases and process control system software/configuration updates. Potential resource consumption issues can be addressed through a number of ways:

  • Compatibility tests can be performed with industrial automation vendor software on the Kaspersky Lab test bed.
  • IAV performs compatibility checks.
  • Kaspersky Lab checks security database updates: SCADA server, workstation, and HMI images are integrated into Kaspersky Lab’s test bed.
  • Kaspersky Security Center automate and test the Kaspersky Lab security updates.

Kaspersky Industrial CyberSecurity for Networks

Kaspersky Lab's framework level security course of action works at the advanced correspondence tradition (Modbus, IEC stack, and ISO) layer, examining mechanical traffic for inconsistencies by methods for forefront DPI (Deep Packet survey) development.

KICS for Networks passes on inert framework traffic checking of variations from the norm and framework security while remaining imperceptible to potential aggressors. KICS for Networks has a specific designing – sensors can be sent autonomously from a central control unit.

KICS for Networks offers a trusted platform that can monitor process control command flow and telemetry data, and enabling, among other things to industrial users:

  • Detection of any command which would reconfigure a PLC or change the PLC state
  • Control parameter changes in technology processes
  • Mitigation from of ‘advanced’ insider interference from engineers, SCADA operators, or other internal staff with direct access to systems as well as protection from outside threats

Kaspersky Industrial CyberSecurity

Security across enterprises should operate at both node and network levels to ensure the highest levels of protection from attacks. KICS  is controlled through a single management console, Kaspersky Security Center, enabling:

  • Centralized management of security policies - different protection settings can be set for different nodes and groups.
  • Facilitate testing of updates before roll-out onto the network, thereby integrating the full process.
  • Role-based access aligned with security policies and urgent actions. Ease of control and visibility at multiple sites are enabled by the Kaspersky Security Center.

USP : Kaspersky Industrial CyberSecurity is a solution developed for critical infrastructures and industrial equipment. This solution combines a variety of conventional security technologies. Device access control is also included in this solution which helps customers monitor connections to portable data storage media and peripheral devices. Kaspersky Industrial CyberSecurity provides cybersecurity across all network levels.

BUYERS
VENDORS
EXPERTS
2.7
ANALYSTS

KASPERSKY LAB detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Feature and Functionality
1.95
2.90
2.65
Services
2.40
3.85
2.85
Pricing
0
0.00
0.90
Deployment
5.00
3.90
3.45
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

KASPERSKY LAB has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    27 Participants

  • Niche Quadrant

    All-Asia-Pacific

    31 Participants

  • Niche Quadrant

    All-Europe

    34 Participants

SECTORS
REGIONS
North America Latin America Middle East and Africa Europe Asia-Pacific
STRENGTHS
  • Product Maturity / Development Tools / Network traffic anoma...
    Security Assessment
    A security assessment is done during which experts analyses the software and hardware solutions used to control the industrial process, and the systems connected to it. The company’s internal penetration testing and cautious evaluation of the ICS condition points of interest, including analysis of industrial systems and protocols followed by pre-approved tests demonstrated on the real system. Show More
  • Product Maturity / Post Deployment / Support & Maintenance
    ICS equipment and frameworks
    ICS Security Assessment administration recognizes security blemishes in ICS on all layers: starting from physical and network security, to vendor-specific vulnerabilities in ICS components such as supervisory control and data acquisition (SCADA) systems, programmable logic controllers (PLCs) and others. Show More
  • Product Maturity / Common standards / General Data Protectio...
    Network Components and its security
    There are vulnerabilities leading to network traffic interception and redirection (including ones in industrial communication protocols) Vulnerabilities in ICS components, such as SCADA, PLCs, smart meters, etc. The company prevents unauthorized access to critical network components. There are various vulnerabilities leading to obtaining unauthorized access to critical network components may be identified, including: Insufficient physical protection of ICS equipment, vulnerable network architecture, insufficient network protection (including flaws in separation of the ICS network from other networks). Show More
  • Product Maturity / Channel of Delivery / System Integrators
    Improving Security Processes
    ICS Security Assessment by Kaspersky Lab helps organizations to understand the weakest spots of ICS and focus on improving the corresponding security processes. It also avoids human, environmental, financial, operational and reputational loss that potentially could be caused by malefactors, by proactively detecting and fixing the vulnerabilities which could be used for attacks. It also analyses systems compliance to ICS security standards specific to region and industry, for instance NERC CIP standards Show More
  • Product Maturity / Post Deployment
    Support & Maintenance
  • Product Maturity / Modes
    Cloud
  • Product Maturity / Modes
    Hybrid
  • Product Maturity / Modes
    On-premise
  • Product Maturity / Pre Deployment
    Implementation
  • Product Maturity / Development Tools
    Log review tools
  • Product Maturity / Development Tools
    Reverse engineering tools
  • Product Maturity / Development Tools
    System artifact review tools
  • Product Maturity / Control systems
    Programmable Logic Controllers (PLCs)
  • Product Maturity / Channel of Delivery
    System Integrators
  • Product Maturity / Nuclear
    IAEA - Computer Security at Nuclear Facilities
  • Product Maturity / Oil and gas
    ISO 27002 (Enterprise Cyber Security)
  • Product Maturity / Oil and gas
    WIB M-2784 (Process Control Domain – Security Requirements for Vendors)
  • Product Maturity / Manufacturing
    ISO/TR 22100-4
  • Product Maturity / Common standards
    Critical Infrastructure Protection Standards (NERC-CIPs)
  • Product Maturity / Energy and Power
    DoE - 21 steps for SCADA security
WEAKNESSES
  • Product Maturity / Antivirus/Malware / Device Control
    Device Control
    Adding devices that can’t protect themselves to the network can create a problem later for the orgnization. Show More
  • Product Maturity / Development Tools / IOC detection tools
    Lack of Enterprise Risk Management (ERM) in ICS
    Deficiencies in enterprise risk management (ERM) in ICS. This makes it hard to link ICS security to high-level corporate goals. Other management vulnerabilities include the lack of ICS security policies, management-level accountabilities, and guidance. Show More
  • Product Maturity / Post Deployment
    Education & Training
  • Product Maturity / Post Deployment
    Incident Response
  • Product Maturity / Pre Deployment
    Cyber attack simulation
  • Product Maturity / Pre Deployment
    Regulatory compliance
  • Product Maturity / Development Tools
    IOC detection tools
  • Product Maturity / Development Tools
    Multi-purpose tools
  • Product Maturity / Development Tools
    Outlier analysis tools
  • Product Maturity / Control systems
    Distributed Control System (DCS)
  • Product Maturity / Control systems
    Engineering workstations
  • Product Maturity / Control systems
    HMI panels
  • Product Maturity / Control systems
    Intelligent Electronic Devices (IEDs)
  • Product Maturity / Control systems
    Remote Terminal Unit (RTU)
  • Product Maturity / Nuclear
    NRC -10 CFR - 73.54
  • Product Maturity / Nuclear
    NRC - Regulatory Guide 5.71
  • Product Maturity / Oil and gas
    ISA-99 (Industrial Automation & Control Systems Security)
  • Product Maturity / Oil and gas
    NIST 800-82 (Guide to Industrial Control Systems)
  • Product Maturity / Manufacturing
    DFARS
  • Product Maturity / Manufacturing
    NIST 171
See More

Have you EVER used KASPERSKY LAB Products?

Share your experience with potential buyers.

TOP FEATURES
  • Development Tools
    Network traffic anomaly detection tools
  • Implementation Methodology
    Risk and Threat Assessment
  • Channel of Delivery
    System Integrators
  • Post Deployment
    Support & Maintenance
  • Energy and Power
    DoE - 21 steps for SCADA security
  • Distributed Denial Of Service
    Behavior based detection
  • Oil and gas
    WIB M-2784 (Process Control Domain – Securit..
  • Pre Deployment
    Implementation
  • Identity And Access Management
    Web single sign-on (SSO)
  • Antivirus/Malware
    Device Control

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Better Anomaly Detection solution"

(*)(*)(*)(*)(*)5
The Siemens Secure-NOK SNOK® Network Anomaly Detection solution runs on the RX1500 Application Processing Engine (APE) module. This APE is x86-based and is designed to use a single-line module slot in a Siemens RUGGEDCOM RX1500 device. It is capable of hosting various cyber security solutions such as Next Generation Firewalls and identity-based cloaking solutions. SNOK® Network Anomaly Detection helps Siemens RUGGEDCOM RX1500 with an additional critical layer for its security application capability.
Internal Analyst,MnM
Internal Analyst, MnM
#17 in Industrial Control Systems Security Solutions 9 Reviews

“Real-time monitoring and cyber security services"

(*)(*)(*)(*)(*)5
MSSPs are empowered by the Nozomi Networks solution to provide real-time monitoring and cyber security services for OT networks. It is a multitenant application that provides best-in-class ICS threat detection.
Internal Analyst,MnM
Internal Analyst, MnM
#2 in Industrial Control Systems Security Solutions

“Enhanced network security"

(*)(*)(*)(*)(*)5
Network Security from Siemens helps customers to be prepared for challenges; it helps them use it as a base to build digital enterprises.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Embedded security deployment model"

(*)(*)(*)(*)(*)5
Schneider offers an embedded security deployment model for industrial automation interconnectivity. Virtualizations and encryption technologies are used by the company to secure containers for varied applications.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#5 in Industrial Control Systems Security Solutions

“Good process overview"

(*)(*)(*)(*)(*)5
ABB''''s S+ Operations offers an arranged, and detailed process overview displays to present situational awareness and recognition anywhere in the water facility.
Other,Company Name Classified
Other, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Robust and easy to use"

(*)(*)(*)(*)(*)5
Siemens’ modern Distributed Control System is robust and easy to use once integrated with all tools. Siemens’ SIMATIC PCS 7 is a process automation software that enables advanced process control, virtual commissioning & process simulation and also monitors plant performance through one integrated engineering system.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#10 in Industrial Control Systems Security Solutions

“Advanced security solutions"

(*)(*)(*)(*)(*)5
McAfee has always been innovative and hence provides advanced software solutions to manage systems centrally. It also helps prevent the proliferation of unauthorized apps and malware.
Internal Analyst,MnM
Internal Analyst, MnM
#10 in Industrial Control Systems Security Solutions

“Best firewall solution"

(*)(*)(*)(*)(*)5
McAfee Firewall Enterprise uses SecureOS and Type Enforced Access Control to ensure efficient security. SecureOS is a UNIX operating system; it uses Type Enforcement security technology that is patented. This ensures superior network security without the need for emergency security patches.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Deploying in high security areas"

(*)(*)(*)(*)(*)5
Access Control Systems are deployed in high-security areas that need monitoring of movement of material or people.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#10 in Industrial Control Systems Security Solutions

“Provides better antimalware solution"

(*)(*)(*)(*)(*)5
McAfee Firewall Enterprise is an anti-virus module used on HTTP, FTP, and Send mail rules for the detection and subsequent blocking of viruses, spyware, and prohibited MIME extensions.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#20 in Industrial Control Systems Security Solutions 10 Reviews

“Anomaly Detection"

(*)(*)(*)(*)(*)5
The Anomaly Detection Engine provided by Indegy creates standard baselines, detects deviations, and triggers alerts for suspicious events.
Internal Analyst,MnM
Internal Analyst, MnM
#17 in Industrial Control Systems Security Solutions 9 Reviews

“Application Control"

(*)(*)(*)(*)(*)5
This discovers threats and suspicious behavior related to specific applications.
Internal Analyst,MnM
Internal Analyst, MnM
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Good Security Solution"

(*)(*)(*)(*)(*)5
Network communications can be secured and controlled, and the security solution provided by Schneider can protect network traffic. These solutions help increase productivity as well as improve asset performance.
Internal Analyst,MnM
Internal Analyst, MnM
#28 in Industrial Control Systems Security Solutions

“Excellent end-point protection"

(*)(*)(*)(*)(*)5
Rockwell automation provides an excellent end-point protection software(e.g.antivirus,anti-malware) which control system PCs and keep all signatures up to date
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#24 in Industrial Control Systems Security Solutions 10 Reviews

“Tracking Advanced Threats"

(*)(*)(*)(*)(*)5
Raytheon Foreground Security model which is V-SOC. The V-SOC model focuses on advanced threats and tracking attacker tactics, techniques, and procedures versus simple alert response. The V-SOC service identifies existing network or host compromises, zero day exploits, data exfiltration, network anomalies, emerging advanced threats, suspicious insider behaviour, use of insecure ports/protocols, and misconfigured devices.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#28 in Industrial Control Systems Security Solutions

“Support and service"

(*)(*)(*)(*)(*)5
Rockwell Automation has been recognized for its excellent support and service for critical production equipment. The successful completion of their work made a significant contribution and deliver high quality parts on schedule.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#12 in Industrial Control Systems Security Solutions 10 Reviews

“Incident response and investigation consultancy services"

(*)(*)(*)(*)(*)5
Kaspersky Lab’s Industrial Systems Emergency Response Team is a project that offers wide range of information services, starting from intelligence on the latest threats and security incidents with mitigation strategies and incident response and investigation consultancy and services. In addition to the latest intelligence about threats and vulnerabilities, Kaspersky Lab’s Industrial CERT shares expertise on compliance.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#48 in Industrial Control Systems Security Solutions 10 Reviews

“Quality Processing and Analysis Tool"

(*)(*)(*)(*)(*)5
With the rise in data analytics ,extracting maximum amount of information from available data sources , the company aims to minimise critical activities and protect the vulnerability. It provides national digital defence capacity permitting government bodies to control access to interchange information, according to local legal and regulatory framework .
Internal Analyst,MnM
Internal Analyst, MnM
#29 in Industrial Control Systems Security Solutions

“Excellent ICS security solution"

(*)(*)(*)(*)(*)5
The company identifies privileged account risks by locating all privileged user and application accounts, credentials and trust relationships, including accounts associated with remote access. It reduces the risk of unauthorized access to critical systems by securing and controlling access to privileged accounts.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#28 in Industrial Control Systems Security Solutions

“Highly focused and skilled"

(*)(*)(*)(*)(*)5
Rockwell team is highly focused, skilled and professional. They have been successful with the work they have been awarded by delivering what was needed on time and on budget. Rockwell intrusion prevention system (IPS) inspects traffic coming from both the enterprise and external networks, and can block traffic that it determines to be malicious.

TOP NEWS