The collaboration offers a new security solution for critical infrastructure using simulations of sophisticated attacks in IT-OT environments
SCADAfence announced a partnership with Keysight Technologies, to integrate Keysight’s Threat Simulator Breach and Attack Simulation (BAS) solution with SCADAfence’s advanced OT Security Platform. The integration allows security teams to run simulations of attacks waged against converged information technology and operational technology (IT-OT) networks to enhance their security posture.
SCADAfence and Keysight have collaborated on a solution that builds on each company’s core strengths. In doing so, both SCADAfence and Keysight help expand the understanding of attacks, detection, and mitigation for both IT and OT. By implementing advanced breach and attack simulation in IT and OT networks, this new solution will assess and validate the efficacy of security controls currently in place, including all known risk factors, most current attack techniques, and human error.
As a result of this collaboration, Keysight customers will be able to expand their breach and attack simulation to OT networks and assets with the SCADAfence Platform. Keysight customers can leverage their existing Keysight visibility components to augment and enhance the Threat Simulator tool’s reporting to cover OT as well.
“To ensure a strong defence, organisations need to embrace an offensive approach that employs up-to-date threat intelligence to continuously verify that their enterprise-wide security controls are working as expected and are optimised for maximum protection. With our latest collaboration with SCADAfence, our customers can run attack simulations originating from IT networks to OT segments within critical infrastructures, validate security controls and ensure they are detecting and preventing attackers from breaching these environments,” said Scott Register, Vice President, Security Solutions, Keysight.
In addition, the SCADAfence platform will provide Keysight’s customers with enhanced information on the vulnerability of converged IT-OT networks through continuous assessment of the defensive controls and strategies in place. For example, the Keysight Threat Simulator tool can now simulate attacks from the IT network to the OT network. This helps evaluate the different risks by understanding the OT device type and criticality, and further understanding the attack paths and impact by getting a connections list of the attacked node.