Connect with us

Hi, what are you looking for?



SCADAfence, Gigamon Partner on Industrial Cybersecurity

Integrated Solution Provides Visibility and Protection Across IT and OT Networks

Integrated Solution Provides Visibility and Protection Across IT and OT Networks

Israeli industrial cybersecurity firm SCADAfence has teamed up with network traffic visibility platform provider Gigamon (NYSE: GIMO) to offer a joint solution that provides visibility and protection for IT and operation technology (OT) networks.

Through Gigamon’s ecosystem partner program, SCADAfence’s network monitoring solution is integrated with Gigamon’s GigaSECURE platform to provide IT and OT security staff with a detailed view of their industrial network, as well as threat detection capabilities, the companies explained.

Most IT security and monitoring solutions currently available were not designed for Operational Technology (OT) environments, often leaving these networks unprotected and unmonitored.

“In a sense, industrial control environments are like an old man—fragile, slow-paced, and not overly adept at dealing with change,” Gigamon’s Johnnie Konstantas explained in a recent SecurityWeek column. “Traffic in these environments is exceedingly low compared to a regular IT network and, for the most part, the technology has been in place for 10+ years and was not developed with Internet connectivity in mind, let alone cybersecurity.”

However, as more industrial control systems are being connected to the Internet to take advantage of features such as remote management, improved efficiency, and lowered costs, there is a risk that comes along with these benefits.

The joint solution from SCADAfenence and Gigamon was designed to help mitigate risks in industrial environments, such as operational downtime, product manipulation and theft of intellectual property.

Advertisement. Scroll to continue reading.

“The joint solution provides industrial asset and network visibility and alerts manufacturers to abnormal activities from malicious malware to non-malicious human error, allowing them to quickly respond with increased accuracy,” Yoni Shohet, Co-founder and CEO of SCADAfence, said in a statement.

How it works

The joint solution leverages Gigamon’s capability to provide visibility of network traffic from across the ICS/SCADA environment, ensuring continuous traffic monitoring.

“The network traffic is passively gathered by Gigamon, deduplicated, aggregated into scalable traffic streams and then passed to SCADAfence’s continuous monitoring solution which analyzes the internal communications, including industrial protocols deep packet inspection (DPI),” SCADAfence explained.

Diagram of SCADAfence Connecting to GigaSECURE Platform

Deployed together and connected via API, the SCADAfence and GigaSECURE platforms can help detect cyber-attacks, monitor and detect non-malicious operational threats such as misconfigurations and human errors, and provide industrial protocol context-aware, network visibility including asset discovery, asset inventory and network topology.

Earlier this year, SCADAfence announced a partnership with network security giant Check Point Software to offer integrated cyber protection for critical infrastructure and industrial control organizations. 

Related: Learn More at SecurityWeek’s ICS Cyber Security Conference

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.