NORTH AMERICA
North America is expected to account for the major share of the global ICS security market and is the most advanced regions in terms of technology adoption and infrastructure. The availability of new ICS network security products and services across critical infrastructures indicates the profitable and high level of Information Assurance (IA) in the region’s ICS security market. In February 2015, the US Government planned to invest around USD 14 billion for deploying cybersecurity solutions to enhance the protection of the network of federal and private institutions from cyber-attacks. In 2014, some industry experts quoted that more than 230 attacks took place in the US, and during the past few years, the Dragonfly malware infected hundreds of business computers within ICS. The NIST has issued an ICS security guide to reduce the weaknesses associated with ICS, such as malicious attacks, asset failures, inadequate malware protection, and other cyber threats. In 2002, in order to improve port security standards, the US Congress passed the Maritime Transportation Act of 2002 and created the Transportation Security Administration (TSA). Thus, specific budget allocations and mandated ICS security policies are expected to make North America the most lucrative market for different categories of ICS security vendors. The strict announcement by the US government that no funding would be allocated to business projects unless cybersecurity is properly addressed as a part of its mission is also developing a sense of awareness among businesses in the region. Various companies, such IBM, CSC, Cisco Systems, McAfee, Lockheed Martin, and Palo Alto Networks operate in this region.

Industrial Control Systems Security Solutions in North America

Comparing 100 vendors in Industrial Control Systems Security Solutions across 377 criteria.

360Quadrant For Industrial Control Systems Security Solutions, Q2 2022

The 20 Companies That Matter Most And How They Stack Up

599,864 professionals have used our research since 2010

All vendors(30)
Filters
Reset
2
2
1
2
2
1
1
1
1
1
1
2
2
2
1
1
1
2
1
1
2
1
1
1
2
1
2
1
20
21
10
12
15
3
15
14
15
14
14
12
17
14
9
8
23
8
13
6
7
8
6
7
5
23
9
6
4
4
5
5
10
7
10
15
6
2
4
14
10
13
5
7
13
16
14
14
Cisco offers ICS capabilities through its IPS Industrial Signatures solution. IPS has been established as a vulnerability mitigation technique for over a decade and can protect ICS networks against threats, regardless of whether the underlying issue is in a traditional network component or specific to ICS. Cisco’s IPS Industrial Signatures solution provides rapid-response to mitigate attacks, while also maintaining the availability and integrity of critical assets.
Read less Read more
Siemens offers ICS solutions through SIRIUS, a unique, comprehensive portfolio for ICS applications. Its strength lies in its modular design, which can be easily integrated into distributed systems. SIRIUS consists of monitoring and control devices, safety systems, position and safety switches, and commanding and signaling devices. Its control systems consist of multi-processor systems that contain simple combinable function blocks, such as simple mathematics or logical operations through motion control of all linear and rotational axis.
Read less Read more
3.6 Online
The ISS SCADA security solution by IBM has three main components: Intrusion Prevention Systems, SCADA Assessment Services, and IBM Managed Security Systems. IBM Proventia Network Intrusion Prevention System (IPS) has the ability to protect systems from critical vulnerabilities or attacks, while IBM Managed Security Services for clients provides outsourced solutions for comprehensive real-time security management.
Read less Read more
3.5
Honeywell offers a vast range of ICS security products including advanced process control software, industrial flame monitoring sensors, switches and controls, automation lifecycle support services, control monitoring and safety systems, gas detection (fixed and portable), industrial wireless solutions, distributed control system, test and measurement sensors, application whitelisting and device control service, endpoint protection, industrial cybersecurity risk manager, managed industrial cyber security services, network security, and response and recovery.
Read less Read more
3.4
ABB offers a wide range of products under its ICS security portfolio, such as Network Manager SCADA/Distribution Management Systems (DMS), SCADA/Energy Management Systems (EMS), SCADA/Generation Management Systems (GMS), and ABB Control Systems 800xA. Its ICS security services include consulting services, maintenance services, professional services, remote monitoring services, and support services. ABB offers safe, effective, and enhanced operation of electric power systems through its SCADA/Energy Management System (EMS). EMS provides an open platform that enables smooth integration with other utility information systems while offering enhanced security levels.
Read less Read more
Trend Micro offers a security platform, Trend Micro Consumer Connect (TMCC) for the telecom industry. It protects connected home environments using a threat intelligence system (Trend Micro Smart Protection Network) that protects communications and secures devices. This platform also delivers additional integrated security services.
Read less Read more
Symantec provides ICS security solutions for both, operators to secure their plants and infrastructure as well as equipment vendors to increase the security of their products. Symantec’s Critical System Protection (SCSP) helps plant/infrastructure operators protect their equipment from sophisticated attacks. SCSP offers robust, signature-less, and host-based protection in managed and unmanaged scenarios, without compromising the device’s performance. Some of the key features of SCSP are application whitelisting, application specific network firewall controls, integrated host-based firewall, USB device whitelisting, auto-sandboxing, anti-exploit mitigation techniques, and deep application discovery.
Read less Read more
3.1
Fortinet’s ICS security or SCADA solution protects ICS from advanced threats. Its appliances are highly reliable for harsh environments and compliant with Federal Information Processing Standard (FIPS) 140-2 and Common Criteria Evaluation Assurance Level (EAL) 4+. The solution is easy to deploy and manage, with tightly integrated security, networking, wireless, and admission control capabilities that can track devices and the traffic they produce.
Read less Read more
3.1
General Electric provides ICS solutions that help improve the operational efficiency of an organization through asset optimization, enhanced process performance, and increased productivity. Prednix, a flagship product launched by the company in 2016, combines cutting-edge technology with industry experience to rapidly analyze machine-grade data and deliver faster outcomes. General Electric mainly caters to the healthcare, power generation, and manufacturing sectors. Its products are flexible and inexpensive and offer better productivity and lower risk as compared to products from its competitors.
Read less Read more
2.8
McAfee’s Database and Endpoint Security offers real-time protection to business-critical databases from external, internal, and intra-database exploits. The solution delivers robust security and constant compliance without the need for architecture changes, expensive hardware, or downtime.
Read less Read more
Check Point uses security gateways, application control, unified central management, asset and anomaly detection, intrusion prevention, and secure harsh environments with 1200R to protect ICS networks from cyber attacks and malicious threats. Its 1200R solution delivers rugged, comprehensive security to most environments.
Read less Read more
Kaspersky Industrial CyberSecurity is a solution developed for critical infrastructures and industrial equipment. This solution combines a variety of conventional security technologies. Device access control is also included in this solution which helps customers monitor connections to portable data storage media and peripheral devices. Kaspersky Industrial CyberSecurity provides cybersecurity across all network levels.
Read less Read more
Belden’s Industrial Cyber Security solution portfolio safeguards and supports industrial networks, PCs, critical endpoints, and industrial controllers while simultaneously maintaining reliability in delivery, high availability, and operational resilience.
Read less Read more
2.6
The visibility, analytics, and automation delivered through Rapid7’s Insight Cloud help security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.
Read less Read more
2.6
FireEye’s solutions for critical infrastructure and ICS are in pace with industry standards and federal regulations to protect complete network environments. The company provides comprehensive solutions which protect important assets from cybersecurity threats.
Read less Read more
Nozomi Networks offers an ICS solution called SCADAguardian. It safeguards control networks from cyber-attacks and operational disruptions by analyzing passive network traffic and rapidly detecting cyber threats. It offers real-time network visualization by improving system awareness and understanding network structure and activity. It also helps monitor network and ICS by providing comprehensive cybersecurity and reliability monitoring.
Read less Read more
Corero’s product Corero SmartWall Threat Defense System (TDS) protects network infrastructure, online services, and confidential data from DDoS attacks. The Corero technology is at par with industry standards on all fronts. Corero provides a comprehensive solution, in a good network design natural “collapsed inspection points” are built inherently by the devices that provide the segmentation between the different levels. Instead of deploying first- or even next-generation firewall technology between the levels, transparent inspection technology is imperative to protect against the wide array of electronic threats facing ICS components today.
Read less Read more
2.3
Indegy developed a cybersecurity platform that provides comprehensive visibility into the critical control plane of Operational Technology (OT) networks to identify threats that place the safety, reliability, and security of ICS at risk. The Indegy Cyber Security platform provides automated and centralized threat monitoring and anomaly detection capabilities. It enables organizations to protect their physical processes from external threats by maintaining comprehensive visibility and oversight of all the activities on OT networks anywhere in the world.
Read less Read more
Schneider offers an open, interoperable, and IoT-enabled platform called EcoStruxure that helps connect businesses making them efficient, sustainable, safe, and more reliable.
Read less Read more
Northrop Grumman offers a SPUDS (SCADA Protocol Unique Digital Signature) tool that monitors and protects Industrial Control Systems (ICS) against malicious activity. The tool is a combination of both, software and hardware components that monitors an organization’s network continuously for the detection of insider threats and anomalous and malicious code.
Read less Read more
Raytheon’s High Speed Guard Industrial Control System, an accredited software solution, offers highly complex, unidirectional or bi-directional automated data transfers between multiple physically segregated networks. Features such as rapid and automatic data transfer, compatibility with diverse communication systems, and low administration cost make High Speed Guard an ideal choice for production-critical systems. This solution also establishes rapid output and low-latency transfer rates.
Read less Read more
Bayshore’s Industrial Cyber Protection Platform provides security against existing cyber threats and risks. It uses a Policy Engine to actively block unauthorized communications on the network, while simultaneously providing alerts to enable IT teams to take appropriate action The main advantages of the platform include logic-rich policy-based security and inspection of industrial application traffic.
Read less Read more
2.1
Darktrace offers Darktrace Enterprise, an artificial intelligence cyber defense solution that uses AI and ML to protect networks, and Darktrace Industrial, a specially designed offering used to identify threats and vulnerabilities in SCADA systems and IT networks as it major offerings. In addition to these solutions, it also offers Darktrace Cloud, Darktrace SaaS, and Darktrace Antigena. The company has adapted innovative mathematical models to ICS data for machines, networks, and users within environments, which spots previously unidentified anomalies in real-time.
Read less Read more
SecurityMatters provides a highly advanced threat monitoring and intelligence platform called SilentDefense that protects ICS/SCADA networks through Deep Packet Inspection (DPI) technology. The platform has a large number of ICS threat indicators that safeguard asset owners from critical cyberattacks, network errors, and operational faults.
Read less Read more
Rockwell offers a modern Distributed Control System (DCS) known as PlantPAx that seamlessly integrates critical process areas and the balance of plants into a common automation platform. The DCS connects process, discrete, power, information, and safety control into one plant-wide infrastructure. Rockwell’s PlantPAx offers a range of architecture options and scalable system capabilities.
Read less Read more
CyberArk provides a security solution that manages privileged access to IT environments. It is scalable and protects networks from malware threats. It also addresses vulnerabilities between IT environments, industrial control systems, and remote users. CyberArk’s Core Privileged Access Security Solution is used by many organizations to protect their digital assets.
Read less Read more
2
Dell is a major technology driven company providing a computing platform for the outdoors. The company provides a security solution that can be deployed in any outside situation without changing the present power connectivity.
Read less Read more
Positive Technologies' ICS security portfolio consists of 2 products, namely, MaxPatrol for vulnerability and compliance management, and PT ISIM for cyber threat detection and incident response. It also provides ICS/SCADA security assessment and forensic investigation services.
Read less Read more
Drive Lock SE is a leading IT firm specializing in IT and data security with a strong focus on the continuous improvement of its products. Security training is expensive and neither powerful nor reasonable, as they are seldom led in direct connection to a related attack. Employees even see them as superfluous, aggravating or irritating, and they don't require the dynamic collaboration surprisingly included. DriveLock Smart SecurityEducation, then again, is a basic, adaptable, persistently accessible on the web or disconnected and is a halfway overseen arrangement.
Read less Read more
1.7
Dragos’ Worldview is a dedicated ICS intelligence offering in the marketplace that provides defenders with contextual reports and IOC’s to further illuminate adversarial behavior and enable appropriate detection and preventative measures. Its Threat Operations Center includes services such as threat hunting and incident response and training.
Read less Read more