Claroty Solution Brief 2019

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16
At a glance
Powered by AI
Claroty's mission is to protect industrial control networks from cyber-attacks. They provide visibility and security for critical infrastructure networks.

Claroty's mission is to protect industrial control networks from cyber-attacks; ensuring the safe and reliable operation of the world’s most critical infrastructures.

With Claroty, cybersecurity and engineering teams are armed with a solution that gives them visibility and tells them exactly what is happening across their complex industrial network. This means better security and reduced downtime, for critical OT environments.

Solution

Brief

Industrial
Networks
Secured
Our Mission
Claroty’s mission is to protect industrial control networks from
cyber-attacks; ensuring the safe and reliable operation of the world’s
most critical infrastructures. Claroty enables customers enjoy the
substantial benefits of increasingly networked-control systems
compromising operational resiliency, personnel safety, or the security
of core assets.

Your Result
With Claroty, your cybersecurity and engineering teams are armed
with a solution that gives them visibility and tells them exactly what is
happening across their complex industrial network. This means better
security and reduced downtime, for your critical OT environments.

www.claroty.com | © All rights reserved Claroty LTD. 2019


The Industry’s

Leading Industrial
Cybersecurity Company
Our mission is to protect industrial control networks from cyber-attacks;
ensuring safe and continuous operation of the world most critical
infrastructures.

Claroty was conceived and is actively supported by the world famous Team8
foundry. With substantial funding from an unrivaled syndicate of global investors–
including some of the most important industrial automation companies on earth–
Claroty has built the leading company in industrial cyber today.

Claroty’s technology has been tested, selected and adopted by the most influential
industrial automation control vendors and networking companies in the world.
Our strategic partnerships also include prominent system integration and managed
security services firms worldwide.

Claroty has assembled an unprecedented executive team and attracted a premier


interdisciplinary team of cybersecurity and industrial control system experts. We
leveraged deep ICS knowledge and experience gained from industry and elite cyber
units of the Israeli Defense Forces to design and build a platform for protecting your
plants, processes and operations from cyber threats.

Our fully integrated cybersecurity platform, with its award-winning suite of products,
provides extreme visibility into industrial networks – enabling unparalleled cyber
threat protection, detection and response. Our technology is designed specifically
for industrial control-networks and will “do no harm” to the underlying industrial
processes these critical networks run.

Claroty has very large-scale production deployments across six continents and
nine industrial segments. With offices around the globe and an unmatched team,
technology and partnerships, Claroty is the company that will be there to protect
your critical industrial processes over the long-haul.
Fortune 500 Customers Strategic Partners

Global Reach

Chemical & Petrochemical Discrete & Process Manufacturing Power and Electrical

HQ

Oil and Gas Pharmaceutical Mining

Marquee Investors

Food & Beverage Transportation Waste Water Treatment


Value Proposition
A single day of downtime can cost $20 Million!

Because industrial systems are critical, they will continue to be targeted; and because they
are increasingly connected, they will be impacted even when they are not specifically
targeted. Attacks in 2017 alone resulted in billions of dollars in losses to operators globally.

Critical infrastructure and other industrial systems were commissioned decades ago and
often continue to operate with outdated, insecure control systems and SCADA devices.
These critical systems were simply not designed with cybersecurity in mind and are exposed
to cyber-attacks.

While industrial systems, especially older versions, contain numerous vulnerabilities attackers
can exploit, ICS software and underlying industrial protocols in widespread use today lack
even basic security controls. After gaining access to industrial networks, attackers can simply
run legitimate software to issue commands that many controllers will execute without
any security checks. Advanced threats will do more to remain stealthy and cause serious
damage, but industrial systems can and will be compromised by less experienced adversaries
as well.

Claroty’s integrated ICS cybersecurity suite was designed to address these inherent
shortcomings and to protect the safety of people, industrial assets, and critical processes
from cyber-attacks.

With Claroty, you can reduce risks to your industrial operations, minimize
unplanned downtime and address regulatory requirements.
The Claroty Difference
Technology powered by Claroty’s Proven, scalable, enterprise-class
CoreX engine and world-class Claroty software with centralized multi-site
Research team management that has battle-tested in
very large distributed deployments

Comprehensive, protection, detection


and response in one integrated platform – Claroty supports integrations with
yielding unmatched cyber-risk a wide range of security software,
management and best in class TCO network infrastructure and IT
operations products for improved
security and reduced cost
Extreme visibility into OT networks –
powering industry-leading threat
detection/ response, and unique OT safe with Zero impact to existing
vulnerability insights systems and processes

The industry’s first virtual segmentation


for OT networks, combined with
automated micro-segmentation support
for unrivaled protection
Bringing Clarity to OT Networks
Extreme Visibility and Advanced Security for Industrial Control Systems

Claroty’s Multispectral Data Collection Capabilities provides:


Complete Network and Asset Visibility - Claroty provides a live window into ICS Networks,
automatically identifying and tracking how assets are configured and changing over time. It
builds a deep understanding of the communication patterns between assets–down to I/O
level–communications that control the physical process.

Unique Insights - The Claroty Research team has an unmatched understanding of ICS
network protocols and experience in protocol analysis. This deep knowledge provides
customers with detailed insights about the inner workings of their industrial control networks.

Unmatched Threat Detection - Claroty leverages advanced behavior-based anomaly


detection to rapidly detect early signs of malicious activity, discovers threats and process
anomalies across the complete “cyber kill chain” and enables comprehensive ICS threat
hunting. This deep knowledge makes it easy for IT/OT teams to stay on top of current ICS
risks.

Proactive Protection - With complete visibility and detailed asset information, Claroty
identifies threats present in the industrial network generating actionable alerts combined
with operational context for detailed insights.

If you can’t see it, you can’t secure it.

If you don’t own it, you can’t analyze it.


Claroty has made a multi-million-dollar investment into the most extensive
ICS lab in the industry. This investment has been paying dividends –
allowing us to design, implement, and validate our unique methodologies
on actual off-the-shelf devices and hardware – and simulate accordingly.

Leveraging this unique ecosystem, our research engineers ensure we continually


evolve our solutions to provide the best possible protections available.
End-to-End

Fully
Integrated
Platform
End-to-End

Fully Integrated Platform Claroty Platform Capabilities Enterprise


Management
Advanced Threat Detection Console
Claroty’s integrated ICS suite protects the safety of people, assets, and critical processes
from cyber-attacks. The platform provides security teams with extreme visibility into Continuous Vulnerability Monitoring
industrial control networks, real-time monitoring, network segmentation, control over
employee and 3rd party remote access, and integration with existing SOC, cybersecurity Network Segmentation
and network infrastructure.
Secure Remote Access

Security Posture Assessment


Claroty Platform

Provides extreme visibility into ICS Networks


Identifies security gaps – including known and emerging threats and vulnerabilities
Automatically generates current state of OT process-level communications and presents
an ideal network segmentation strategy
Detects security posture changes
Enables proactive threat hunting with actionable threat information
Secures, monitors, and records remote connections to ICS assets

Protect Control

Proactively discover and eliminate Implement network segmentation


vulnerabilities, misconfigurations and and manage remote access by
unsecure connections. enforcing granular access policies
and recording sessions.

Detect Respond Claroty CoreX Technology


Continuously monitor and detect Receive context rich alerts for This advanced engine powers the Claroty Platform and is the foundation
malicious activity and high-risk rapid triage and investigation, on which Claroty’s integrated suite of products is built on. It was specifically
changes throughout the and automate response using designed to ensure safe, secure and reliable operations in large, complex
attack “kill-chain”. existing network infrastructure. industrial networks.
Advanced

CoreX Technology
Claroty’s advanced CoreX engine powers the Claroty Platform and is
the foundation on which Claroty’s integrated suite of products is built
on. It was specifically designed to ensure safe, secure and reliable
operations in large, complex industrial networks.

Monitoring
CoreX establishes a high-fidelity baseline model of the OT network
and employs advanced, behavior-based anomaly detection, coupled
with a powerful intrusion detection engine to rapidly discover
known and unknown threats. The system continuously monitors
OT environments for changes and analyzes the network to uncover
vulnerabilities by engaging Claroty’s proprietary knowledge base.

Visualization
The sophisticated visualization engine depicts network nodes and
communications pathways down to the lowest levels of the OT
network–down to the serial and fieldbus networks that control
physical processes. Advanced filtering combined with active
animations delivers a complete picture of the network and how nodes
are communicating.
Scalable Architecture
Claroty’s advanced CoreX engine was specifically designed to ensure safe, secure and

Data Collection reliable operations in large, complex industrial networks and is fully tuned to support
With multispectral data collection, CoreX analyzes industrial multiple use cases, technical constraints, and environments including sites with
networks and provides nearly 100% visibility into the OT environment. limited computing power, requiring a smaller physical footprint, and scenarios where
Using proprietary dissectors for all major IT and ICS protocols and communication over low-bandwidth links is necessary.
configuration files, the system safely extracts fine-grained details
about both IT and industrial assets in the OT network, discovers how
the assets are configured and communicating, and deciphers the
SOC Plant | Control Center Remote Sites
automation system conversations across serial and IP-based networks
– all the way down to the I/O level. With multispectral data collection,
customers can employ one or multiple modes to meet the unique
technical, operational, deployment and cost requirements present in
different industrial environments.

Enterprise Management Continuous Threat Continuous Threat


Console Detection Server Detection Sensor
Claroty

Continuous Threat Detection Real-time Threat Monitoring

Leveraging the advanced anomaly detection capability in CoreX, the system delivers
Claroty’s flagship product, Continuous Threat Detection, provides extreme visibility, superior threat detection and provides alerts across the full “cyber kill chain” – from early
continuous threat and vulnerability monitoring, and deep insights into ICS networks. It reconnaissance activity to later-stage attacks designed to impact control systems and
was specifically designed to ensure safe, secure and reliable operations in large, complex processes. The system enables unparalleled threat hunting capabilities for a range of
industrial networks – ensuring zero impact to the underlying operational processes and threats – a critical aspect for SOC and OT teams when investigating and responding to
improved cyber resiliency. alerts. A key differentiator is the system’s context-rich alerts – ensuring SOC teams have
immediate situational awareness and the details required to rapidly investigate issues and
collaborate with “shop floor” teams for rapid remediation.
Continuous Threat Detection extracts precise details about each asset on the industrial
network, profiles all communications and protocols, generates a fine-grain behavioral
baseline that characterizes legitimate traffic, and alerts you to network changes, new
vulnerabilities and threats. The alerts the system generates provides the contextual
information you need to investigate and respond quickly.
Virtual OT Network Segmentation Continuous Vulnerability Monitoring
Leveraging our understanding of how your industrial automation system is configured Claroty provides deep insights into your ICS environment-enabling to proactively identify
and communicating, we use proprietary algorithms to group assets into logical and fix configuration and other network hygiene issues that can leave your network
segments and generate an ideal “virtual segmentation” scheme. Armed with this vulnerable to attack or lead to operational issues. Claroty continuously monitors the
knowledge, and the associated baseline communications details, your teams can network for new known vulnerabilities, leveraging security intelligence curated by
implement firewall policies–from port and protocol rules to application layer policies– Claroty Research, making it easy for IT/OT teams to stay on top of current ICS risks. A key
or to construct appropriate VLANs. This unique capability provides cost-effective option differentiator is the system’s ability to provide precise CVE matching – down to the precise
for segmenting lower levels of OT networks where blocking is prohibited. firmware versions for industrial devices.
Claroty

Secure Remote Access


Product Highlights

Proactive Access Control – Through granular user and asset policies governing which
Secure Remote Access is the policy-based access control product within the Claroty assets authorized users can see and access, when they can log into each asset and the
Platform. It enables organizations to safeguard their networks from the threats introduced authentication-level required for access.
by unmanaged and unmonitored remote access.

Password Vaulting – Securely store user and asset credentials. Eliminate shared passwords
Secure Remote Access is designed to minimize the risk remote users, including employees schemes, easily manage password changes and avoid risks from valid passwords of
and contractors introduce to industrial networks. The system provides a single, managed non-active users.
interface through which all remote users connect and authenticate prior to performing
software upgrades, periodic maintenance and other system support activities. Workflow Based Controls and Real-Time Monitoring – Using manual access requests and
permissions and “over-the-shoulder” real-time video visibility into all remote user activity–
Network administrators employ the system to control which users are granted access including a “red button” ability to terminate ongoing sessions.
to industrial control assets and for what purpose. The system enforces password
management and access control policies, governs remote connections and monitors and Activity Reports – Filtered by user, asset or session and providing video recordings of
records remote access sessions. all remote sessions.

Product Benefits

Monitor
SRA enables system administrators continuously monitor and audit privileged
users, sessions, and assets, including which ICS devices are being accessed,
by which user, and the total number of users who have access to each asset.

Secure
If a contradiction between the stated remote access purpose and the actual
activity occurs, system administrators can immediately terminate the remote
session, preventing network disruption, and improving overall cyber resiliency.

Audit
Following the remote session, system administrators and auditors can playback
a full video recording of each session, as well correlate specific reports filtered
by user, asset or session to facilitate retrospective auditing.
Claroty

Security Posture Assessment Product Highlights

Consolidated view of operational and security risk – instantly detect all of your
Claroty’s Security Posture Assessment is an offline assessment product that provides security OT vulnerabilities, providing a consolidated view of cyber risks across your entire
teams with visibility and insights into the OT network’s security risk posture. The tool consumes a ICS network.
PCAP (packet capture) data file, collected from a network switch, and produces a comprehensive
analysis of the ICS network. The report provides a summary and detailed analysis of the assets and Context-aware Intelligence – deep visibility into the network’s assets, networking,
communications discovered on the industrial network, pinpoints vulnerable assets and uncovers and infrastructure along with a consolidated view of common vulnerabilities,
network configuration and other “network hygiene” issues that can provide attackers a pathway or threats, and common mitigation steps.
impact critical processes.
Actionable mitigation and remediation – provide security teams with contextual
mitigation recommendations to reduce the attack surface and strengthen the
overall security posture.

Fully automated process – fully automated report generation that does not require
prior ICS knowledge and is considerably faster than manually generated reports.

Product Benefits

Asset Discovery
Automatically identify assets across the entire ICS network for
inventory and management tasks as well as regulatory and internal
audit requirements.

Detailed Network Analysis


Create a detailed report on the various control process devices and how they
communicate within and across the network, including specific visibility on
their communication paths and associated devices.

Comprehensive Insights
Provides a holistic picture and risk assessment across the entire
ICS network.
Claroty

Enterprise Management Console Product Highlights

Multi-site View of Traffic, Assets and Activities – receive consolidated cross-site asset,
Claroty’s Enterprise Management Console is a centralized server that aggregates data alert and activity data, which can be filtered and analyzed to proactively search for
from Claroty products deployed across multiple sites and displays a unified view of operational and spot important security trends.
assets, activities, alerts and access control.

Unified Dashboard for a Comprehensive View – consolidated view of all the data
The ideal product for IT/OT SOC deployments – providing security teams with Claroty products generate: alerts, assets, sites and remote connections, providing full
immediate visibility and alerts across the entire industrial control system complex. visibility into the enterprise industrial control system security posture.

The Enterprise Management Console can be easily integrated with various SIEM, log Integration with Security Tools – send alert data to various SIEM, log management
management, and security analytic products; enabling security teams to correlate OT and security analytic products enabling the security team to correlate OT and IT and
and IT issues and gain real-time situational awareness across gain real-time situational awareness to active and potential threats.
their networks.

Integrations
Claroty exports alert data via Syslog into leading SIEM products (e.g., Arcsight, Splunk,
QRadar, etc.). SOC analysts can utilize existing analytic tools to filter and correlate alert
data – enriching their existing IT security knowledge with data and insights into OT security.

Product Benefits

Centralized OT Visibility and Cybersecurity


Integration with existing security tools provides security
teams with comprehensive real-time metrics across the entire
infrastructure, including threats, risks and anomalies

Site 1 SIEM &


Log Mgmt.

Streamlined SOC Operations


Consolidated ICS cybersecurity, risk metrics, and at-a-glance
dashboards from thousands of assets across hundreds of
distributed sites and remote facilities
Site 2 Enterprise Security
Analytics
Management
Console
Efficient, Remote System Management
Easy maintenance and update mechanisms allows SOC and
Security teams to remotely upgrade in-the-field deployed systems
Site 3 Asset/Change
Mgmt. Ticketing
with a click of a button
Claroty in Depth
Claroty products are deployed as virtual appliances or installed on physical servers. Products
within the Claroty Platform are integrated with each other and with existing cybersecurity tools,
network infrastructure and IT systems-enabling you to leverage your current investment in tools,
processes and training. For widely distributed environments, our sensor technology can be
deployed on switches and other network infrastructure-providing flexibility and reduced cost
for the most demanding use cases.

Extreme Visibility / Continuous Monitoring

Security Operations Center (SOC)


Detect known attacks (MitM) Connecting to Internet/corporate
SIEM Log Mgt. Analytics File Servers ERP Sales Mail Detect network reconnaissance attempts network DMZ
Level 4 Signature-based detection Detect misconfigurations
Enterprise IT Unauthorized cross level/zone (IP conflicts, dynamic IP)
communication New assets in the network
Firewall
Proactively detect nonresponsive devices

Enterprise Engineering Application Historian Operator WSUS


Management Station Station Station Server
Console Plaintext passwords Proactively detect bad configurations
Level 3 Unencrypted communication Simulate potential attack vectors
Operations Detect external connection (Internet) Unsecured protocols
Traffic activity summary Asset used ports

HMI Scada Server HMI Scada Server


Firmware download Online edits to PLC projects
Level 2 Configuration download Anomalous protocols behavior
Process Network Logic change Detect process communication halts
Corrupt OT packet

SPAN

Continuous
Threat PLC RTU RTU PLC
Detection
Level 1 PLC actions: Start, Stop, Monitor, Run, Reboot, Program, Test
Control Network Authentication to PLC
Maintain PLC privileged operations

Fieldbus I/O visibility


Level 0
Field Devices I/O
Profile and monitor nested devices external communication
Fan Pump Valve Actuator Fan Sensor Valve Pump
Broad Support

For Industrial Control System


• OSISoft PI • Rockwell CIP • Telnet - Moxa
• Siemens P2 • Rockwell PCCC • Telnet - Omniflow

and ICS / IT Protocols1


• POP3 • S7Comm Plus • Telnet - Hirschmann
• ProConoS (TCP 20547) • S7Comm Plus • Telnet - SEL
• Profinet DCP • Microsoft SAMR • ABB Totalflow
• Profinet I/O • Microsoft CIFS (SMB) • Triconex Tristation
• Microsoft RDP • SNMP • Triconex TSAA
Passive: Continuous, Real-time Monitoring of OT Networks
• MQTT • SSH • Yokogawa VNET (VHF)
• RCDP • Synchrophasor • Yokogawa odeq
• ABB Bailey • GE SDI Classic (MarkVie)
• Redlion Crimson • Telnet - DeltaV
• ABB DMS system • GE SRTP
• ABB HC800 (Infininet) • HART-IP
• ABB Spirit • HiDiscovery – Hirschmann LLC
• ABB Symphony Plus • Honeywell C200 – Ftebcip
• Alstom E-Terra • Honeywell Experion – CNTComm (C300, EHPM) Active: Precise, Periodic Queries of OT and IT Assets
• BACNET • Honeywell EpicMo (C300 management)
• NetBIOS Browser (UDP 138) • Honeywell Firewall CF9 • DNP3 • S7comm Query • CIP Query

• Cisco Discovery Protocol (CDP) • HTTP • Hirschmann Discovery Query • Siprotec Query • WMI Query
• Control Technologies Inc. (CTI) • HTTP-XML (specific schemes) • Modbus Information Object • Telnet • TCP Port Scan
• Microsoft DCE RPC • IEC101 • Net Bios • SNMP Query • Beckhoff Query
• ABB DCS Service Manager • IEC103 • Profinet-DCP Query • ENIP Query • BACnet Query
• Emerson DeltaV • IEC104
• DACP • Lantronix Serial GW
• DHCP • LLDP
• DNP3 • Mitsubishi Melsec App DB: Offline Enrichment of OT Asset Data
• Emerson Ovation • MMS • Schneider – Modicon, Quantum • Honeywell – Experion
• Emerson ROC Plus • Modbus • Schneider – Concept • Honeywell – EHPM
• ETHERNET/IP • Modbus Modsoft
• Schneider Triconex – Tristation • GE – rx3i,9030
• Foundation Fieldbus (FF) • Modbus Concept
• Yokogawa – CentumVP/CS3000 • GE – Bently Nevada
• Foxboro LLC • Modbus Eltec
• Yokogawa – Prosafe • ABB – AC800M
• FTP – SEL • Modbus Execload
• Siemens FWL LOAD (firmware upload) • Modbus Schneider
• GE-ALM • NetBios Datagram Service
• GE Bentley Nevada (BNC3500) • Niagara Tridium (BMS)
• GE-EGD • Microsoft NTLMSSP (Auth protocol)
• GE-EGD-CMP • Omniflow Flow computer
• GE PAC8000 (AXE)
ICS Vendors
• OPTO
• GE QuickPanel (TRAPI+HTTP) • OPTO MMP
• GE SDI (MarkVie)

1
The list shows many of the most commonly used protocols. Claroty will add support for
additional protocols in accordance with specific customer needs.
For a full list of supported protocols, visit www.claroty.com

You might also like