Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

SparkCognition and Siemens Join Forces for Industrial Security Solution

Artificial intelligence company SparkCognition and German industrial giant Siemens have joined forces for an industrial security solution designed for the energy sector.

Artificial intelligence company SparkCognition and German industrial giant Siemens have joined forces for an industrial security solution designed for the energy sector.

The new solution, named “ DeepArmor Industrial, fortified by Siemens,” combines SparkCognition’s AI-powered cyber defense solution DeepArmor with Siemens’ expertise in operational technology (OT) security to help organizations protect endpoints and remote assets.

The solution includes antivirus, threat detection, zero-day attack prevention, and application control capabilities for oil and gas, power generation, and transmission and distribution systems.

Siemens and SparkCognition say DeepArmor Industrial uses predictive AI to block unknown threats, it can secure unpatched legacy systems, allows organizations to implement a zero-trust whitelisting approach to protect fixed-function systems, and provides autonomous security for isolated industrial networks as it does not require frequent updates.

Learn More About Energy Sector Security at SecurityWeek’s ICS Cyber Security Conference and SecurityWeek’s Security Summits Virtual Event Series

“Through our extensive work with the energy industry, we’ve seen the pain points and challenges the industry is facing right now,” said Sridhar Sudarsan, CTO at SparkCognition.

“The industry needs security solutions that can both operate autonomously and are designed with the modern industrial environment in mind. Together with Siemens, we are excited to bring next-generation endpoint protection that is specifically designed to increase the cyber resilience of OT networks and prevent advanced threat actors from impacting critical infrastructure,” Sudarsan added.

Studies published in recent years have shown that the energy sector is one of the most affected industries when it comes to vulnerabilities found in industrial control systems (ICS), and it’s one of the sectors most targeted by cyberattacks.

Related: RigUp Database Exposed 76,000 Files From U.S. Energy Sector

Related: European Electrical Energy Organization Discloses Breach

Related: U.S. Planted Powerful Malware in Russia’s Power Grid

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.