ID-OT-ICS-Network-Monitoring-Thumb

Solution Brief: OT/ICS Network Monitoring

Solution Briefs

Solution Brief: OT/ICS Network Monitoring

Solution Brief: OT/ICS Network Monitoring

View Solution Brief

Learn how the Industrial Defender NIDS passively monitors all OT network traffic using a SPAN port, mirror port or network TAP within the control network security perimeter, enabling quick asset discovery and detection of anomalous activity, including internally generated attacks and any attacks that may have circumvented perimeter defenses.

  • Automatically discover assets connected to the ICS network
  • Detect malicious activity or malware by monitoring network traffic via signatures
  • Capture anomalies from OT process control network traffic flow between applications on HMI or servers and controllers such as PLCs and RTUs
  • Visualize network traffic flow and volume
  • Safely replay a packet capture without disrupting the network
OT-ICS-Network-Monitoring