Bayshore Networks to offer free cyber risk identification tool for plant networks

Bayshore

Industrial cybersecurity provider Bayshore Networks announced the release of a free cyber risk identification tool for plant networks. The new tool, Scrutiny, will give operational technology and IT teams a better understanding of assets and communications in their industrial networks.

“Scrutiny is like a camera, it’s basically a snapshot of the traffic. Many small and mid-sized asset owners find they cannot afford high-cost, comprehensive visibility tools which perform more like video by providing a continuous readout of network activity,” Toby Weir-Jones, Chief Product Officer for Bayshore Networks, said in a press release. “Scrutiny provides OT and IT teams with a practical solution that can identify OT equipment IP addresses, operating systems, MAC addresses and vendors, country, public Domain Name Service (DNS), OT protocols, and communications topologies. This information can be very valuable as building blocks when beginning the process of identifying risks that could affect safety and security of production.”

Bayshore’s new asset and communications flow detection tool was built to handle OT assets and protocol communications activity in plant networks. The software acts as a Windows application on a desktop or laptop  and can work from a live packet capture, or with offline PCAP files.

Scrutiny delivers a basic security report of assets, protocol activity, and network communication flows. It can be used for asset discovery and communication flow analysis. Users can also pinpoint communications that indicate security risks due to weak or missing policies, or overly permissive access which can be corrected once identified.

Additionally, Scrutiny can identify communications from plant assets flowing to routable external IP addresses. In such an event, the software will perform an IP reputation security check to determine if a known botnet or other malware sites are active on the customer network.

A complimentary guide to the who`s who in industrial cybersecurity tech & solutions

Free Download

Related