top of page

OT SOC. maintain facilities all around the world. 

Our managed security services combine advanced detection, forensics, and 24x7 monitoring and control by our security analysts for expanded OT protection.

IAM - Identity Access Manager

The identity Access Manager Solution is the industry’s most complete solution for protecting, controlling, and monitoring privileged access across critical infrastructure facilities. Designed from the ground up for security, the IAM solution helps efficiently manage privileged credentials and access rights, proactively monitor and control privileged activity, intelligently identify suspicious activity, and quickly respond to threats.

IAM - Identity Access Manager

File Sanitization - Whitening Server

Whitening server for file transfer disarms known and unknown file threats coming from the external network before they enter your internal network. Designated to work in a complete network separation environment, Whitening station for file transfer automates the file sharing process and sanitizes files from any zero-day threats on local or remote servers, using unique technology. The data is then replicated to the internal server for safe use.

File Sanitization - Whitening Server

ASTORIA Cyber provides OT Security Operations Center (SOC) Services offering 24x7 support.

Monitoring.png
Control.emf.png

Whether you're challenged with meeting Cyber budget demands, fighting new threat adversaries, or you are looking for more efficiency around your compliance and security initiatives, our OT SOC will give you the results you need.

We understand the uniqueness of your HMI, SCADA and ICS systems, and that's why our Security Operations Center (SOC) Services are designed for OT facilities only.

SIEM - Security Information and Event Management

The complexity of modern application and systems is ever increasing and to understand the behavior of complex systems, administrators/SCADA/Ops etc. often need to collect and monitor all relevant information produced by their applications and security devices. Such information often needs to be analyzed and correlated to determine how their systems are behaving. Consequently, we can take decisions with a full picture of the Facility state in terms of cyber-security.

SIEM - Security Information and Event Management

Unidirectional security - Unidirectional Gateways

Unidirectional Gateways contain both hardware and software components. The hardware components include a TX Module, containing a fiber-optic transmitter/ laser, and an RX Module, containing an optical receiver, but no laser. The hardware components – transmitter, fiber optic cable and receiver, (or core data diode technology) – along with the software components –application software connectors – ensure one-way transmission and replication of server information from an industrial control network to an external network, but prevent the propagation of any virus, DOS attack, human error or any Cyber-attack at all back into the protected network.

Unidirectional security - Unidirectional Gateways

Threat Detection – Intrusion Detection System

Our IDS giving you A real-time, up to date visual mapping of your entire network, including IP and non-IP devices (Fieldbus, serial). Detect both known vulnerability exploits (CVEs) and undocumented, "zero-day" attacks. The IDS provide a map view of the network topology, divided into sub-networks, indicating each edge device such as PLCs, RTUs etc.

Operational alerts are prioritized and color-coded and presented graphically as map links. The user is able to filter alerts by severity, protocol and more.

The IDS also contain traffic analysis tools, which provide:

  • Log files with all violations

  • Log files for the maintenance process

  • Traffic statistics of links in the network

  • Performance-over-time graphs for selected links

Threat Detection – Intrusion Detection System

IAM - Identity Access Manager

The identity Access Manager Solution is the industry’s most complete solution for protecting, controlling, and monitoring privileged access across critical infrastructure facilities. Designed from the ground up for security, the IAM solution helps efficiently manage privileged credentials and access rights, proactively monitor and control privileged activity, intelligently identify suspicious activity, and quickly respond to threats.

IAM - Identity Access Manager

File Sanitization - Whitening Server

Whitening server for file transfer disarms known and unknown file threats coming from the external network before they enter your internal network. Designated to work in a complete network separation environment, Whitening station for file transfer automates the file sharing process and sanitizes files from any zero-day threats on local or remote servers, using unique technology. The data is then replicated to the internal server for safe use.

File Sanitization - Whitening Server

SIEM - Security Information and Event Management

The complexity of modern application and systems is ever increasing and to understand the behavior of complex systems, administrators/SCADA/Ops etc. often need to collect and monitor all relevant information produced by their applications and security devices. Such information often needs to be analyzed and correlated to determine how their systems are behaving. Consequently, we can take decisions with a full picture of the Facility state in terms of cyber-security.

SIEM - Security Information and Event Management

Unidirectional security - Unidirectional Gateways

Unidirectional Gateways contain both hardware and software components. The hardware components include a TX Module, containing a fiber-optic transmitter/ laser, and an RX Module, containing an optical receiver, but no laser. The hardware components – transmitter, fiber optic cable and receiver, (or core data diode technology) – along with the software components –application software connectors – ensure one-way transmission and replication of server information from an industrial control network to an external network, but prevent the propagation of any virus, DOS attack, human error or any Cyber-attack at all back into the protected network.

Unidirectional security - Unidirectional Gateways

Threat Detection – Intrusion Detection System

Our IDS giving you A real-time, up to date visual mapping of your entire network, including IP and non-IP devices (Fieldbus, serial). Detect both known vulnerability exploits (CVEs) and undocumented, "zero-day" attacks. The IDS provide a map view of the network topology, divided into sub-networks, indicating each edge device such as PLCs, RTUs etc.

Operational alerts are prioritized and color-coded and presented graphically as map links. The user is able to filter alerts by severity, protocol and more.

The IDS also contain traffic analysis tools, which provide:

  • Log files with all violations

  • Log files for the maintenance process

  • Traffic statistics of links in the network

  • Performance-over-time graphs for selected links

Threat Detection – Intrusion Detection System

bottom of page