Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Symantec Unveils USB Scanning Station for ICS, IoT Environments

Symantec on Wednesday unveiled a new product designed to protect critical infrastructure organizations, including industrial and Internet of Things (IoT) environments, against USB-borne threats.

Symantec on Wednesday unveiled a new product designed to protect critical infrastructure organizations, including industrial and Internet of Things (IoT) environments, against USB-borne threats.

Industrial Control System Protection (ICSP) Neural is a network-integrated USB scanning station that should make it easier for organizations to ensure that the USB drives used to transfer data between devices are not infected with malware.

ICSP Neural leverages Symantec malware and threat intelligence capabilities, along with file reputation ratings to detect and neutralize malicious files. Additionally, each suspicious file is executed in a lightweight virtual machine to identify both known and unknown threats.

Symantec launches Industrial Control System Protection (ICSP) Neural

The new product also comes with an optional enforcement driver that is installed on endpoints to ensure that USB drives that have not been scanned cannot be used. The enforcement driver is an MSI package with a size of less than 5 Mb and it works on any type of operating system, even legacy systems such as Windows XP.

The driver blocks unscanned USBs and allows scanned devices to be connected. However, in an effort to avoid having to constantly re-scan devices while performing maintenance, only files added by the user after scanning are made inaccessible, Symantec told SecurityWeek.

The USB scanning station can be deployed in industrial organizations in convenient locations, explained Kunal Agarwal, general manager of Symantec’s Internet of Things division. For example, in the case of a vessel, scanners can be placed in each of the 2-3 control rooms. In manufacturing plants, each manufacturing line can have its own station.

Agarwal said organizations typically deploy the ICSP Neural device in the vicinity of operational systems. In the case of more dense facilities, such as in the healthcare sector, the scanner can be placed at the entrance.

ICSP Neural complements Symantec’s Critical System Protection solution, which Agarwal has described as “an application whitelisting agent that has been remastered from the ground up to provide fixed-function devices cybersecurity without an internet connection.”

Symantec told SecurityWeek that pricing for ICSP Neural starts at $25,000. The product can be ordered now and is expected to ship in early 2019.

“USB devices are given away at events, shared between co-workers, and reused again and again for business and personal use, introducing the risk of accidental or malicious infection. The impact of connecting an infected device to a critical system can be devastating,” said Patrick Gardner, senior VP of advanced threat protection and email security at Symantec. “Behind the scenes, ICSP Neural retrofits existing infrastructure with a central nervous system utilizing artificial intelligence to protect critical infrastructure. On the front end, a rugged aluminum design embodies a simple, intuitive user experience that clearly highlights potential threats.”

Related: Symantec Launches Email Threat Isolation Solution

Related: Symantec Acquires Appthority, Javelin Networks

Related: Symantec Completes Internal Accounting Investigation

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.