Keep the Machines that Drive your Business Secure with Stellar Cyber
Common OT Security Use Cases
Non-Standard SCADA
Protocol Detection
DPI engine detects all protocols occurring within the SCADA network
SCADA Network
Segmentation Violation
All traffic flows (east-west, north-south) are monitored via sensors, logs (for example, firewalls), and Connectors (for example, endpoint products) When analyzed in context, that data can be essential to identify lateral movement.
Network Attack
Detection
IDS, with commercial signature feeds, can identify thousands of network-based attacks
Malicious or
Suspicious File
Reconstruct files over the wire and detect if they are malicious or suspicious.
Anomalous Communication Process / Port / Data Transfer
Normal” is learned for all environments, including SCADA, alerting when abnormal is detected.
IT to OT
Breach
All data across IT, DMZ, and OT are collected and analyzed to detect incidents that start/end in IT and laterally move to OT.
OT Security Specific Features
Agentless Deep Packet Inspection
3700 total protocols, 57 SCADA (includes ICCP and DNP3), 18 IoT supported out of the box.
IDS/Malware
Detection
Real-time updates from paid signatures and over-the-wire file reconstruction and classification.
DMZ
Log Collection
Ability to collect logs from all sources within DMZ (for example, Windows jump host, Zero Trust Solution).
Network Detection & Response
Detecting threats on the network using supervised and unsupervised learning.
Asset
Discovery
Discover assets and resolution from all data sources.
Vulnerability
Management
Third party vulnerability management sensors can be installed on a Security Sensor (for example, Tenable).
Level 3 Device Log Collection
Ability to collect logs from all sources within Level 3 (for example, Engineering Workstation, Remote Access Server).
OT Product
Log Collection
Ability to collect logs from OT security products (for example, Nozomi) and OT devices (for example, Honeywell).
Flexible Deployment Options
Allows immediate deployment and future-proofing to new security demands.
Turn OT Security on its Head
Protect Your Entire
Attack Surface
Find threats in your IoT devices, critical servers, the cloud, and anywhere in between.
Increase Security Team Performance
See gains in MTTD and MTTR by combining intelligent automation and your expertise.
Reduce Costs &
Simplify SecOps
Eliminate complicated, expensive security products, freeing budget and resources.