Quantcast
Published On: Thu, Oct 18th, 2018

Security Matters Launches the Self-Defense Monitoring System

Security Matters, a leader in operational technology protection, announced that its enhanced intelligence OT silent monitoring and network monitoring platform, Self Defense. With its new release, Security Matter’s fast system can use intelligence information faster to fight cyber security threats in an Industrial Compound System network.

The new Silent Defense (V. 3.13) has been created to help users create a robust network monitoring system. It’s based on the protective exploitation of its intelligence information. The new benefits and features include:

photo Gerd Altmann via pixabay

  • Forensic Time Machine: This feature allows users to perform back-in-time, automatic individuation and threat searches of previous compromises. After digesting the cyber and the Indicators of Compromise, Silent Defense scans the latest 3 months (or more depending on the configuration settings) to determine if the threats were seen in the ICS network.
  • Threat Intelligence Ingestion – A system that offers continuous and rapid protection against cyber threats. The ingestion of the indicator of compromise helps empower enterprise-grade customers to integrate into scale with its complex security infrastructures.
  • Enhanced  (Industrial Threat Library) – This system now includes protocol support and vulnerability defense for about 1,600 ICS-related threat vulnerabilities, indicators, and Common Vulnerabilities and Exposures. Also, SilentDefense has achieved its goal of using more than 100 IT/OT protocols.
  • Multi-Factor File Dissection – this setting analyzes and extracts files based on rule-based analysis (such as proprietary malicious hashes and YARA) to create quick recommendation actions and to create multi-module threat detection. Also due to Security Matters IT/OT integration usage, users can send their files to almost any 3rd party analysis technology for it to obtain an automatic active response.
  • Extended Network Authentication Analysis has been used to monitor, correlate, and identify user activity in the host network with anomalous activity. This is where Self Defense extends the detection of authenticated users in the network to innovative investigation scenarios.

What Does This Mean For Network Monitoring Systems?

Thanks to the recent release of Self Defense, we can see companies increase their online and offline security settings. For example, it allows users to see multiple files and see which ones are safe to use.

Monitoring Remote Offices

If your network expands through multiple locations, a network monitoring system can help you manage every device that’s within those locations. For example, let’s say that you manage the network of multiple school campuses, or monitoring the regional or local branches within a financial institution.

The remote monitoring tool gives you enough visibility on how devices in your remote and central locations are performing. And you can get alerts whenever and wherever the performance falters.

These network monitoring system capabilities are helpful for companies that have a small team stationed in one spot but are also responsible for fully managing a network. With this system, you don’t have to travel to the location to the device to fix it. This increases your productivity and allows you to relax knowing that your network is under your monitoring and surveillance.

Conclusion

Overall, having a good network monitoring system will help your company in the long run. Not only does it make your team more efficient, but it gives you enough power to keep your network safe from third-party hackers. Thus, think about getting a system to ensure your IT network is safe once it’s in operation!

Author: Adam Edmond

On the DISPATCH: Headlines  Local  Opinion

Subscribe to Weekly Newsletter

* indicates required
/ ( mm / dd ) [ALL INFO CONFIDENTIAL]

About the Author

- Outside contributors to the Dispatch are always welcome to offer their unique voices, contradictory opinions or presentation of information not included on the site.

Tags

Leave a comment

XHTML: You can use these html tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Sign up for our Weekly Newsletter



Categories

Archives

At the Movies

Pin It