Claroty Solution Brief 2019
Claroty Solution Brief 2019
Claroty Solution Brief 2019
Brief
Industrial
Networks
Secured
Our Mission
Claroty’s mission is to protect industrial control networks from
cyber-attacks; ensuring the safe and reliable operation of the world’s
most critical infrastructures. Claroty enables customers enjoy the
substantial benefits of increasingly networked-control systems
compromising operational resiliency, personnel safety, or the security
of core assets.
Your Result
With Claroty, your cybersecurity and engineering teams are armed
with a solution that gives them visibility and tells them exactly what is
happening across their complex industrial network. This means better
security and reduced downtime, for your critical OT environments.
Leading Industrial
Cybersecurity Company
Our mission is to protect industrial control networks from cyber-attacks;
ensuring safe and continuous operation of the world most critical
infrastructures.
Claroty was conceived and is actively supported by the world famous Team8
foundry. With substantial funding from an unrivaled syndicate of global investors–
including some of the most important industrial automation companies on earth–
Claroty has built the leading company in industrial cyber today.
Claroty’s technology has been tested, selected and adopted by the most influential
industrial automation control vendors and networking companies in the world.
Our strategic partnerships also include prominent system integration and managed
security services firms worldwide.
Our fully integrated cybersecurity platform, with its award-winning suite of products,
provides extreme visibility into industrial networks – enabling unparalleled cyber
threat protection, detection and response. Our technology is designed specifically
for industrial control-networks and will “do no harm” to the underlying industrial
processes these critical networks run.
Claroty has very large-scale production deployments across six continents and
nine industrial segments. With offices around the globe and an unmatched team,
technology and partnerships, Claroty is the company that will be there to protect
your critical industrial processes over the long-haul.
Fortune 500 Customers Strategic Partners
Global Reach
Chemical & Petrochemical Discrete & Process Manufacturing Power and Electrical
HQ
Marquee Investors
Because industrial systems are critical, they will continue to be targeted; and because they
are increasingly connected, they will be impacted even when they are not specifically
targeted. Attacks in 2017 alone resulted in billions of dollars in losses to operators globally.
Critical infrastructure and other industrial systems were commissioned decades ago and
often continue to operate with outdated, insecure control systems and SCADA devices.
These critical systems were simply not designed with cybersecurity in mind and are exposed
to cyber-attacks.
While industrial systems, especially older versions, contain numerous vulnerabilities attackers
can exploit, ICS software and underlying industrial protocols in widespread use today lack
even basic security controls. After gaining access to industrial networks, attackers can simply
run legitimate software to issue commands that many controllers will execute without
any security checks. Advanced threats will do more to remain stealthy and cause serious
damage, but industrial systems can and will be compromised by less experienced adversaries
as well.
Claroty’s integrated ICS cybersecurity suite was designed to address these inherent
shortcomings and to protect the safety of people, industrial assets, and critical processes
from cyber-attacks.
With Claroty, you can reduce risks to your industrial operations, minimize
unplanned downtime and address regulatory requirements.
The Claroty Difference
Technology powered by Claroty’s Proven, scalable, enterprise-class
CoreX engine and world-class Claroty software with centralized multi-site
Research team management that has battle-tested in
very large distributed deployments
Unique Insights - The Claroty Research team has an unmatched understanding of ICS
network protocols and experience in protocol analysis. This deep knowledge provides
customers with detailed insights about the inner workings of their industrial control networks.
Proactive Protection - With complete visibility and detailed asset information, Claroty
identifies threats present in the industrial network generating actionable alerts combined
with operational context for detailed insights.
Fully
Integrated
Platform
End-to-End
Protect Control
CoreX Technology
Claroty’s advanced CoreX engine powers the Claroty Platform and is
the foundation on which Claroty’s integrated suite of products is built
on. It was specifically designed to ensure safe, secure and reliable
operations in large, complex industrial networks.
Monitoring
CoreX establishes a high-fidelity baseline model of the OT network
and employs advanced, behavior-based anomaly detection, coupled
with a powerful intrusion detection engine to rapidly discover
known and unknown threats. The system continuously monitors
OT environments for changes and analyzes the network to uncover
vulnerabilities by engaging Claroty’s proprietary knowledge base.
Visualization
The sophisticated visualization engine depicts network nodes and
communications pathways down to the lowest levels of the OT
network–down to the serial and fieldbus networks that control
physical processes. Advanced filtering combined with active
animations delivers a complete picture of the network and how nodes
are communicating.
Scalable Architecture
Claroty’s advanced CoreX engine was specifically designed to ensure safe, secure and
Data Collection reliable operations in large, complex industrial networks and is fully tuned to support
With multispectral data collection, CoreX analyzes industrial multiple use cases, technical constraints, and environments including sites with
networks and provides nearly 100% visibility into the OT environment. limited computing power, requiring a smaller physical footprint, and scenarios where
Using proprietary dissectors for all major IT and ICS protocols and communication over low-bandwidth links is necessary.
configuration files, the system safely extracts fine-grained details
about both IT and industrial assets in the OT network, discovers how
the assets are configured and communicating, and deciphers the
SOC Plant | Control Center Remote Sites
automation system conversations across serial and IP-based networks
– all the way down to the I/O level. With multispectral data collection,
customers can employ one or multiple modes to meet the unique
technical, operational, deployment and cost requirements present in
different industrial environments.
Leveraging the advanced anomaly detection capability in CoreX, the system delivers
Claroty’s flagship product, Continuous Threat Detection, provides extreme visibility, superior threat detection and provides alerts across the full “cyber kill chain” – from early
continuous threat and vulnerability monitoring, and deep insights into ICS networks. It reconnaissance activity to later-stage attacks designed to impact control systems and
was specifically designed to ensure safe, secure and reliable operations in large, complex processes. The system enables unparalleled threat hunting capabilities for a range of
industrial networks – ensuring zero impact to the underlying operational processes and threats – a critical aspect for SOC and OT teams when investigating and responding to
improved cyber resiliency. alerts. A key differentiator is the system’s context-rich alerts – ensuring SOC teams have
immediate situational awareness and the details required to rapidly investigate issues and
collaborate with “shop floor” teams for rapid remediation.
Continuous Threat Detection extracts precise details about each asset on the industrial
network, profiles all communications and protocols, generates a fine-grain behavioral
baseline that characterizes legitimate traffic, and alerts you to network changes, new
vulnerabilities and threats. The alerts the system generates provides the contextual
information you need to investigate and respond quickly.
Virtual OT Network Segmentation Continuous Vulnerability Monitoring
Leveraging our understanding of how your industrial automation system is configured Claroty provides deep insights into your ICS environment-enabling to proactively identify
and communicating, we use proprietary algorithms to group assets into logical and fix configuration and other network hygiene issues that can leave your network
segments and generate an ideal “virtual segmentation” scheme. Armed with this vulnerable to attack or lead to operational issues. Claroty continuously monitors the
knowledge, and the associated baseline communications details, your teams can network for new known vulnerabilities, leveraging security intelligence curated by
implement firewall policies–from port and protocol rules to application layer policies– Claroty Research, making it easy for IT/OT teams to stay on top of current ICS risks. A key
or to construct appropriate VLANs. This unique capability provides cost-effective option differentiator is the system’s ability to provide precise CVE matching – down to the precise
for segmenting lower levels of OT networks where blocking is prohibited. firmware versions for industrial devices.
Claroty
Proactive Access Control – Through granular user and asset policies governing which
Secure Remote Access is the policy-based access control product within the Claroty assets authorized users can see and access, when they can log into each asset and the
Platform. It enables organizations to safeguard their networks from the threats introduced authentication-level required for access.
by unmanaged and unmonitored remote access.
Password Vaulting – Securely store user and asset credentials. Eliminate shared passwords
Secure Remote Access is designed to minimize the risk remote users, including employees schemes, easily manage password changes and avoid risks from valid passwords of
and contractors introduce to industrial networks. The system provides a single, managed non-active users.
interface through which all remote users connect and authenticate prior to performing
software upgrades, periodic maintenance and other system support activities. Workflow Based Controls and Real-Time Monitoring – Using manual access requests and
permissions and “over-the-shoulder” real-time video visibility into all remote user activity–
Network administrators employ the system to control which users are granted access including a “red button” ability to terminate ongoing sessions.
to industrial control assets and for what purpose. The system enforces password
management and access control policies, governs remote connections and monitors and Activity Reports – Filtered by user, asset or session and providing video recordings of
records remote access sessions. all remote sessions.
Product Benefits
Monitor
SRA enables system administrators continuously monitor and audit privileged
users, sessions, and assets, including which ICS devices are being accessed,
by which user, and the total number of users who have access to each asset.
Secure
If a contradiction between the stated remote access purpose and the actual
activity occurs, system administrators can immediately terminate the remote
session, preventing network disruption, and improving overall cyber resiliency.
Audit
Following the remote session, system administrators and auditors can playback
a full video recording of each session, as well correlate specific reports filtered
by user, asset or session to facilitate retrospective auditing.
Claroty
Consolidated view of operational and security risk – instantly detect all of your
Claroty’s Security Posture Assessment is an offline assessment product that provides security OT vulnerabilities, providing a consolidated view of cyber risks across your entire
teams with visibility and insights into the OT network’s security risk posture. The tool consumes a ICS network.
PCAP (packet capture) data file, collected from a network switch, and produces a comprehensive
analysis of the ICS network. The report provides a summary and detailed analysis of the assets and Context-aware Intelligence – deep visibility into the network’s assets, networking,
communications discovered on the industrial network, pinpoints vulnerable assets and uncovers and infrastructure along with a consolidated view of common vulnerabilities,
network configuration and other “network hygiene” issues that can provide attackers a pathway or threats, and common mitigation steps.
impact critical processes.
Actionable mitigation and remediation – provide security teams with contextual
mitigation recommendations to reduce the attack surface and strengthen the
overall security posture.
Fully automated process – fully automated report generation that does not require
prior ICS knowledge and is considerably faster than manually generated reports.
Product Benefits
Asset Discovery
Automatically identify assets across the entire ICS network for
inventory and management tasks as well as regulatory and internal
audit requirements.
Comprehensive Insights
Provides a holistic picture and risk assessment across the entire
ICS network.
Claroty
Multi-site View of Traffic, Assets and Activities – receive consolidated cross-site asset,
Claroty’s Enterprise Management Console is a centralized server that aggregates data alert and activity data, which can be filtered and analyzed to proactively search for
from Claroty products deployed across multiple sites and displays a unified view of operational and spot important security trends.
assets, activities, alerts and access control.
Unified Dashboard for a Comprehensive View – consolidated view of all the data
The ideal product for IT/OT SOC deployments – providing security teams with Claroty products generate: alerts, assets, sites and remote connections, providing full
immediate visibility and alerts across the entire industrial control system complex. visibility into the enterprise industrial control system security posture.
The Enterprise Management Console can be easily integrated with various SIEM, log Integration with Security Tools – send alert data to various SIEM, log management
management, and security analytic products; enabling security teams to correlate OT and security analytic products enabling the security team to correlate OT and IT and
and IT issues and gain real-time situational awareness across gain real-time situational awareness to active and potential threats.
their networks.
Integrations
Claroty exports alert data via Syslog into leading SIEM products (e.g., Arcsight, Splunk,
QRadar, etc.). SOC analysts can utilize existing analytic tools to filter and correlate alert
data – enriching their existing IT security knowledge with data and insights into OT security.
Product Benefits
SPAN
Continuous
Threat PLC RTU RTU PLC
Detection
Level 1 PLC actions: Start, Stop, Monitor, Run, Reboot, Program, Test
Control Network Authentication to PLC
Maintain PLC privileged operations
• Cisco Discovery Protocol (CDP) • HTTP • Hirschmann Discovery Query • Siprotec Query • WMI Query
• Control Technologies Inc. (CTI) • HTTP-XML (specific schemes) • Modbus Information Object • Telnet • TCP Port Scan
• Microsoft DCE RPC • IEC101 • Net Bios • SNMP Query • Beckhoff Query
• ABB DCS Service Manager • IEC103 • Profinet-DCP Query • ENIP Query • BACnet Query
• Emerson DeltaV • IEC104
• DACP • Lantronix Serial GW
• DHCP • LLDP
• DNP3 • Mitsubishi Melsec App DB: Offline Enrichment of OT Asset Data
• Emerson Ovation • MMS • Schneider – Modicon, Quantum • Honeywell – Experion
• Emerson ROC Plus • Modbus • Schneider – Concept • Honeywell – EHPM
• ETHERNET/IP • Modbus Modsoft
• Schneider Triconex – Tristation • GE – rx3i,9030
• Foundation Fieldbus (FF) • Modbus Concept
• Yokogawa – CentumVP/CS3000 • GE – Bently Nevada
• Foxboro LLC • Modbus Eltec
• Yokogawa – Prosafe • ABB – AC800M
• FTP – SEL • Modbus Execload
• Siemens FWL LOAD (firmware upload) • Modbus Schneider
• GE-ALM • NetBios Datagram Service
• GE Bentley Nevada (BNC3500) • Niagara Tridium (BMS)
• GE-EGD • Microsoft NTLMSSP (Auth protocol)
• GE-EGD-CMP • Omniflow Flow computer
• GE PAC8000 (AXE)
ICS Vendors
• OPTO
• GE QuickPanel (TRAPI+HTTP) • OPTO MMP
• GE SDI (MarkVie)
1
The list shows many of the most commonly used protocols. Claroty will add support for
additional protocols in accordance with specific customer needs.
For a full list of supported protocols, visit www.claroty.com