An increase in malware and attacks on Industrial Control Systems (ICS), the growing number of new vulnerabilities in ICS equipment and an increased necessity for these systems to be integrated with other environments (like ERP, for example) have necessitated a more thorough approach to ICS security. In addition, ICS security is closely tied with functional security and a successful hacker attack could lead to production accidents.
Our ICS Security Assessment service identifies security flaws in ICS on all layers: starting from physical and network security, to vendor-specific vulnerabilities in ICS components such as supervisory control and data acquisition (SCADA) systems, programmable logic controllers (PLCs) and others. This service provides you with information on the consequences of vulnerabilities exploitation, evaluates the effectiveness of implemented security measures, and enables you to plan further actions to fix detected flaws and improve security.
A security assessment that simulates an internal attacker in the corporate network attempting to obtain unauthorized access to the ICS environment
Internal penetration testing and careful assessment of the ICS environment specifics, including analysis of industrial systems and protocols followed by pre-approved tests demonstrated on the real system
A security assessment during which our experts will separately analyze the software and hardware solutions used to control the industrial process, and the systems connected to it
A summary report detailing all discovered vulnerabilities and security flaws, with actionable recommendations for immediate resolution
Eхplore examples of Kaspersky Lab security solutions at work in the field
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Various vulnerabilities leading to obtaining unauthorized access to critical network components may be identified, including:
As a result of the service, customers obtain a report containing:
Let’s Start the Conversation and talk to one of our experts about how True Cybersecurity could inform your corporate security strategy, please get in touch.