Industrial Control Systems Security Solutions in Latin America

Comparing 100 vendors in Industrial Control Systems Security Solutions across 377 criteria.
  • Cisco offers ICS capabilities through its IPS Industrial Signatures solution. IPS has been established as a vulnerability mitigation technique for over a decade and can protect ICS networks against threats, regardless of whether the underlying issue is in a traditional network component or specific to ICS. Cisco’s IPS Industrial Signatures solution provides rapid-response to mitigate attacks, while also maintaining the availability and integrity of critical assets.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1984
    • $10BN to $50BN
    • 50,001 to 75,000
  • Siemens offers ICS solutions through SIRIUS, a unique, comprehensive portfolio for ICS applications. Its strength lies in its modular design, which can be easily integrated into distributed systems. SIRIUS consists of monitoring and control devices, safety systems, position and safety switches, and commanding and signaling devices. Its control systems consist of multi-processor systems that contain simple combinable function blocks, such as simple mathematics or logical operations through motion control of all linear and rotational axis.

    Read More
    • Enterprise
    • Bavaria, Germany
    • Founded: 1847
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • The ISS SCADA security solution by IBM has three main components: Intrusion Prevention Systems, SCADA Assessment Services, and IBM Managed Security Systems. IBM Proventia Network Intrusion Prevention System (IPS) has the ability to protect systems from critical vulnerabilities or attacks, while IBM Managed Security Services for clients provides outsourced solutions for comprehensive real-time security management.

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Honeywell offers a vast range of ICS security products including advanced process control software, industrial flame monitoring sensors, switches and controls, automation lifecycle support services, control monitoring and safety systems, gas detection (fixed and portable), industrial wireless solutions, distributed control system, test and measurement sensors, application whitelisting and device control service, endpoint protection, industrial cybersecurity risk manager, managed industrial cyber security services, network security, and response and recovery.

    Read More
    • Enterprise
    • New Jersey, USA
    • Founded: 1906
    • $10BN to $50BN
    • 10,001 to 15,000
  • ABB offers a wide range of products under its ICS security portfolio, such as Network Manager SCADA/Distribution Management Systems (DMS), SCADA/Energy Management Systems (EMS), SCADA/Generation Management Systems (GMS), and ABB Control Systems 800xA. Its ICS security services include consulting services, maintenance services, professional services, remote monitoring services, and support services. ABB offers safe, effective, and enhanced operation of electric power systems through its SCADA/Energy Management System (EMS). EMS provides an open platform that enables smooth integration with other utility information systems while offering enhanced security levels.

    Read More
    • Enterprise
    • Zurich, Switzerland
    • Founded: 1988
    • $10BN to $50BN
    • 10,001 to 15,000
  • Trend Micro offers a security platform, Trend Micro Consumer Connect (TMCC) for the telecom industry. It protects connected home environments using a threat intelligence system (Trend Micro Smart Protection Network) that protects communications and secures devices. This platform also delivers additional integrated security services.

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000
  • Symantec provides ICS security solutions for both, operators to secure their plants and infrastructure as well as equipment vendors to increase the security of their products. Symantec’s Critical System Protection (SCSP) helps plant/infrastructure operators protect their equipment from sophisticated attacks. SCSP offers robust, signature-less, and host-based protection in managed and unmanaged scenarios, without compromising the device’s performance. Some of the key features of SCSP are application whitelisting, application specific network firewall controls, integrated host-based firewall, USB device whitelisting, auto-sandboxing, anti-exploit mitigation techniques, and deep application discovery.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • Fortinet’s ICS security or SCADA solution protects ICS from advanced threats. Its appliances are highly reliable for harsh environments and compliant with Federal Information Processing Standard (FIPS) 140-2 and Common Criteria Evaluation Assurance Level (EAL) 4+. The solution is easy to deploy and manage, with tightly integrated security, networking, wireless, and admission control capabilities that can track devices and the traffic they produce.

    Read More
    • Enterprise
    • California, USA
    • Founded: 2000
    • $1BN to $5BN
    • 45,001 to 50,000
  • General Electric provides ICS solutions that help improve the operational efficiency of an organization through asset optimization, enhanced process performance, and increased productivity. Prednix, a flagship product launched by the company in 2016, combines cutting-edge technology with industry experience to rapidly analyze machine-grade data and deliver faster outcomes. General Electric mainly caters to the healthcare, power generation, and manufacturing sectors. Its products are flexible and inexpensive and offer better productivity and lower risk as compared to products from its competitors.

    Read More
    • Enterprise
    • Massachusetts, USA
    • Founded: 1892
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • McAfee’s Database and Endpoint Security offers real-time protection to business-critical databases from external, internal, and intra-database exploits. The solution delivers robust security and constant compliance without the need for architecture changes, expensive hardware, or downtime.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1987
    • $1BN to $5BN
    • 5,001 to 10,000
  • Check Point uses security gateways, application control, unified central management, asset and anomaly detection, intrusion prevention, and secure harsh environments with 1200R to protect ICS networks from cyber attacks and malicious threats. Its 1200R solution delivers rugged, comprehensive security to most environments.

    Read More
    • Enterprise
    • Tel Aviv, Israel
    • Founded: 1993
    • $1BN to $5BN
    • 1,001 to 5,000
    • $14,490.00 - $16,181.00
  • Kaspersky Industrial CyberSecurity is a solution developed for critical infrastructures and industrial equipment. This solution combines a variety of conventional security technologies. Device access control is also included in this solution which helps customers monitor connections to portable data storage media and peripheral devices. Kaspersky Industrial CyberSecurity provides cybersecurity across all network levels.

    Read More
    • Enterprise
    • Moscow, Russia
    • Founded: 1997
    • $500MN to $1BN
    • 1,001 to 5,000
  • FireEye’s solutions for critical infrastructure and ICS are in pace with industry standards and federal regulations to protect complete network environments. The company provides comprehensive solutions which protect important assets from cybersecurity threats.

    Read More
    • SME
    • California, USA
    • Founded: 2004
    • $500MN to $1BN
    • 1,001 to 5,000
  • Schneider offers an open, interoperable, and IoT-enabled platform called EcoStruxure that helps connect businesses making them efficient, sustainable, safe, and more reliable.

    • Enterprise
  • Raytheon’s High Speed Guard Industrial Control System, an accredited software solution, offers highly complex, unidirectional or bi-directional automated data transfers between multiple physically segregated networks. Features such as rapid and automatic data transfer, compatibility with diverse communication systems, and low administration cost make High Speed Guard an ideal choice for production-critical systems. This solution also establishes rapid output and low-latency transfer rates.

    Read More
    • Enterprise
    • Massachusetts, USA
    • Founded: 1922
    • $101MN to $500MN
    • 10,001 to 15,000
  • Darktrace offers Darktrace Enterprise, an artificial intelligence cyber defense solution that uses AI and ML to protect networks, and Darktrace Industrial, a specially designed offering used to identify threats and vulnerabilities in SCADA systems and IT networks as it major offerings. In addition to these solutions, it also offers Darktrace Cloud, Darktrace SaaS, and Darktrace Antigena. The company has adapted innovative mathematical models to ICS data for machines, networks, and users within environments, which spots previously unidentified anomalies in real-time.

    Read More
    • SME
    • California, USA
    • Founded: 2013
    • $11MN to $50MN
    • 501 to 1,000
  • Rockwell offers a modern Distributed Control System (DCS) known as PlantPAx that seamlessly integrates critical process areas and the balance of plants into a common automation platform. The DCS connects process, discrete, power, information, and safety control into one plant-wide infrastructure. Rockwell’s PlantPAx offers a range of architecture options and scalable system capabilities.

    Read More
    • Enterprise
    • Wisconsin, US
    • Founded: 1903
    • $5BN to $10BN
    • 20,001 to 25,000
  • CyberArk provides a security solution that manages privileged access to IT environments. It is scalable and protects networks from malware threats. It also addresses vulnerabilities between IT environments, industrial control systems, and remote users. CyberArk’s Core Privileged Access Security Solution is used by many organizations to protect their digital assets.

    Read More
    • SME
    • Massachusetts, USA
    • $101MN to $500MN
    • 1,001 to 5,000
  • Dell is a major technology driven company providing a computing platform for the outdoors. The company provides a security solution that can be deployed in any outside situation without changing the present power connectivity.

    Read More
    • Enterprise
    • Texas, USA
    • Founded: 1984
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Positive Technologies' ICS security portfolio consists of 2 products, namely, MaxPatrol for vulnerability and compliance management, and PT ISIM for cyber threat detection and incident response. It also provides ICS/SCADA security assessment and forensic investigation services.

    Read More
    • Enterprise
    • Framingham, Massachusetts, US
    • Founded: 2000
    • $51MN to $100MN
    • 1 to 50
  • Airbus offers ICS solutions such as ICS Security Risk Analysis and ICS Security Maturity Check. Airbus’ ICS solutions help customers uncover weaknesses and flaws in their industrial systems. ICS Security Risk Analysis helps customers with document analysis, risk analysis, data analysis, reporting, and risk evaluation.

    Read More
    • Enterprise
    • Leiden, Netherlands
    • Founded: 1970
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Emerson offers control & safety systems for efficient manufacturing processes through its automation solutions segment. The company offers industry-specific services such as consulting, project management, and maintenance.

    Read More
    • Enterprise
    • Missouri, USA
    • Founded: 1890
    • $10BN to $50BN
    • 50,001 to 75,000

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Industrial Control Systems Security Solutions tools.
3.92
3.7
3.65
  • Regulatory compliance for ICS

  • Minimize risk - backup and recovery

  • Asset visibility and safety / Real-time monitoring

  • Lower TCO

  • Integration of legacy devices

  • Increased productivity / improve system performance

  • Security automation / central management

  • Secure remote access

  • Avoid shutdowns

  • Predictive cybersecurity

  • Network segmentation

  • Control system modernization / IT-OT consolidation

  • Feature and Functionality

    • Types of Security

      Cloud Security | Network Security | Endpoint Security | Database Security | Application Security | Web Security |
    • Product Features

    • API Integration

    • Anomaly Detection

    • Access Management

    • Backup & Recovery

    • Authentication

    • Asset Management

    • Data Compliance

    • Content Filtering

    • Complaince Administration

    • Incident Logs

    • Incident Forensics

    • Endpoint Intelligence

    • Proactive Alerts

    • Policy Enforcement

    • Intelligence Reports

    • Security Monitoring

    • Security Code Analysis

    • Security Auditing

    • User Analytics

    • Security Workflow Automation

    • Security orchestration

    • Workload Protection

    • Web Control

    • Vulnerability Assessment

    • Intrusion Prevention

    • Development Tools

      Network traffic anomaly detection tools | IOC detection tools | Log review tools | Outlier analysis tools | System artifact review tools | Reverse engineering tools | Multi-purpose tools |
    • Core Features

      Control systems | Security standards | Functionality |
    • Integration

      ODVA | FDT – field device tool | EDDL - Electronic Device Description Language |
  • Breadth and Depth of Product Offerings

    • Products/Solutions Offered

    • licenses

    • Encryption 

    • Solutions Offered

      Scada Encryption | Virtualization Security | Control Valves | Threat Isolation | Others | Security and Vulnerability Management  | Programmable Logic Controllers |
    • Security Patch Management

    • Security Configuration Management 

    • Biometrics

  • Scalability

    • Number of End Users

    • End User Organization Size

  • Use Cases

    • Integration of legacy devices

    • Increased productivity / improve system performance

    • Minimize risk - backup and recovery

    • Lower TCO

    • Asset visibility and safety / Real-time monitoring

    • Security automation / central management

    • Secure remote access

    • Avoid shutdowns

    • Predictive cybersecurity

    • Network segmentation

    • Control system modernization / IT-OT consolidation

    • Regulatory compliance for ICS

  • Services

    • Risk Management Services

    • Other Services

      Support and Services |
    • Audit And Reporting

    • Pre Deployment

      Regulatory compliance | Cyber attack simulation | Implementation | Design & Integration | Strategy consulting |
    • Post Deployment

      Support & Maintenance | Managed Security Services | Education & Training | Incident Response |
  • Pricing

    • Per User

    • Per Node/Asset

    • Outcome Based

    • Module Based

    • As a Service

  • Deployment

    • Modes

      Cloud | Hybrid | On-premise |
    • Implementation Methodology

      Risk and Threat Assessment | Software Enabled Methodology | Risk/VaR Simulation | Risk Based Asset Classification | Delivery |
  • Geographic Footprint

    • Sales Offices/Development Centers -North America

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Offices/Development Centers -Europe

    • Sales Offices/Development Centers -Asia-Pacific

    • Sales Offices/Development Centers -Middle East and Africa

    • Sales Offices/Development Centers -Latin America

    • Channel Partners - North America

    • Channel Partners - Europe

    • Channel Partners - Middle East and Africa

    • Channel Partners - Asia-Pacific

    • Channel Partners - Latin America

  • Breadth of Applications Served

    • Tailor-made/customized Solutions

    • % Revenue from Industry Verticals

      Revenue - Transportation and Logistics | Revenue - Other Industry Verticals | Revenue - Energy and Utilities | Revenue - Energy and Power | Revenue - Energy and Chemicals |
    • Industry Vertical Addition

    • Industry Vertical

  • Vision Alignment

    • Number of Customers Catered

    • New Product Developments

    • R&D Spend

      5% - 10% | < 5% | > 20% | 15% - 20% | 10% - 15% |
    • Number of Patents

  • Financial Strength

    • Profitability

    • Last Financial Year Revenue

      > USD 50 billion | USD 500 - 1000 million | USD 250 - 500 million | USD 1 - 10 billion | USD 10 - 50 billion | < USD 100 million | USD 100 - 250 million |
    • Forecasted Revenue Growth Rate

    • % Revenue from Applications

      Revenue - North America | Revenue - Middle East and Africa | Revenue - Latin America | Revenue - Europe | Revenue - Asia-Pacific |
  • Mergers and Acquisitions Strategy

    • M&A

    • Joint Ventures

    • Partnership and Collaborations

  • Sector Footprint

    • Transportation and Logistics

    • Manufacturing

    • Energy and Utilities

    • Other Industry Verticals

    • Energy and Power

  • Partner Ecosystem

    • System Integrators

    • Implementation Partners

    • Talent Availability

  • Total Funding Amount

  • Revenue

  • Funding Status

TOP REVIEWS

Looking for Industrial Control Systems Security Solutions? Get help
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#5 in Industrial Control Systems Security Solutions

“Good process overview"

(*)(*)(*)(*)(*)5
ABB''''s S+ Operations offers an arranged, and detailed process overview displays to present situational awareness and recognition anywhere in the water facility.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Better Anomaly Detection solution"

(*)(*)(*)(*)(*)5
The Siemens Secure-NOK SNOK® Network Anomaly Detection solution runs on the RX1500 Application Processing Engine (APE) module. This APE is x86-based and is designed to use a single-line module slot in a Siemens RUGGEDCOM RX1500 device. It is capable of hosting various cyber security solutions such as Next Generation Firewalls and identity-based cloaking solutions. SNOK® Network Anomaly Detection helps Siemens RUGGEDCOM RX1500 with an additional critical layer for its security application capability.
External,
External,
#17 in Industrial Control Systems Security Solutions 9 Reviews

“Real-time monitoring and cyber security services"

(*)(*)(*)(*)(*)5
MSSPs are empowered by the Nozomi Networks solution to provide real-time monitoring and cyber security services for OT networks. It is a multitenant application that provides best-in-class ICS threat detection.
Other,Company Name Classified
Other, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Robust and easy to use"

(*)(*)(*)(*)(*)5
Siemens’ modern Distributed Control System is robust and easy to use once integrated with all tools. Siemens’ SIMATIC PCS 7 is a process automation software that enables advanced process control, virtual commissioning & process simulation and also monitors plant performance through one integrated engineering system.
External,
External,
#10 in Industrial Control Systems Security Solutions

“Best firewall solution"

(*)(*)(*)(*)(*)5
McAfee Firewall Enterprise uses SecureOS and Type Enforced Access Control to ensure efficient security. SecureOS is a UNIX operating system; it uses Type Enforcement security technology that is patented. This ensures superior network security without the need for emergency security patches.