Protected: Radiflow Mockup

Founded - 2009; HQ - Israel

This content is password protected. To view it please enter your password below:

  • iSID – Industrial Threat Detection:Radiflow’s iSID Detection & Analysis Platform provides proactive cybersecurity for critical infrastructures through non-intrusive monitoring of distributed production networks for changes in topology and behavior.iSID’s multiple security engines offer capabilities pertaining to specific type of network activity: modeling and visibility of OT and IT devices, protocols and sessions; detection of threats and attacks; policy monitoring and validation of operational parameters; rules-based maintenance management; and networked device management.
  • iCEN Central Monitoring:iCEN simplifies and streamlines the monitoring and management of multiple instances of Radiflow’s iSID Industrial Threat Detection Systems.iCEN is part of cyber-protection ecosystem which includes, alongside iSID, also the iSAP Smart Collector. This unique ecosystem allows large enterprises and Managed Security Service Providers (MSSP) to efficiently and cost-effectively deploy OT network visibility and threat detection capabilities.
  • iSim Industrial Service Manager:iSIM is an intuitive network management tool for Radiflow’s secure ruggedized gateways installed at remote sites and substations. It provides a real-time view of all networked devices and allows combining devices on disparate networks into a single group for simple, quick cross-network maintenance, thus increasing the cost-effectiveness of the operator’s overall cybersecurity operation.
  • iSOC – Radiflow for MSSPs:

Radiflow’s MSSP offering addresses the critical challenges facing ICS/IIoT security service providers: assuring secure and efficient data collection, analysis and transfer, as well as provisioning multiple detection engines, in a cloud environment.

  • iRISK – Industrial Risk Analytics:

iRISK’s automatically generates a full risk-status report, detailing network properties, overall risk score, extent of risk introduced by devices and protocols, likelihood of lateral threat movement between business processes, potential attack paths and more. The process is triggered automatically each time a change is detected on the network.

Company and Industry news

Latest Events


Nordic IT Security Summit

Time: March 2 @ – March 3 @

As Digital transformation advances, Nordic companies are accelerating the migration of data to the cloud, crafting new digital systems and increasing the number of endpoints.

Join over 5,000 Industrial OT & Cyber professionals

Weekly Newsletter direct to your inbox