Info Image

Radiflow and Cyolo Team Up to Protect OT Networks from Unauthorized Device Access

Radiflow and Cyolo Team Up to Protect OT Networks from Unauthorized Device Access Ilan Barda, Founder and CEO of Radiflow (Image Credit: Radiflow)

Radiflow, creators of the leading OT cybersecurity platform, CIARA, on Tuesday announced a partnership with Cyolo to better secure remote access and further detect anomalous behaviors. This partnership ensures that access to and secure operation of OT/ICS networks and assets is continuously monitored and controlled, reinforced by swift and effective response to threats.

The increased connectivity from various vendors has resulted in a surge in authorized external users accessing OT networks remotely. However, this heightened connectivity also brings uncertainty surrounding the identity of users on the other end of a connection and the potential presence of threat actors. To ensure that only authorized users gain access, Radiflow has collaborated with Cyolo to establish a fully monitored, secured remote connectivity with comprehensive authentication and session validation capabilities. Additionally, the integration enables operators to rapidly block unauthorized/unrecognized sessions and sources of malicious traffic while swiftly containing malicious behavior and malware.

This not only heightens security but also provides a dual advantage for organizations struggling to fill employment gaps. The joint solution empowers operators to focus their resources and rapidly block unauthorized or unrecognized sessions and sources of malicious traffic. It enables them to promptly contain malicious behavior and the malware itself, ensuring uninterrupted operations without being forced to take downtime.

This effort continues Radiflow’s efforts in working with companies to identify the business’ most valuable assets and create an OT-security plan in a way that manages resources effectively. This approach creates strong alignment throughout organizations, ensuring that CISOs and other executives are on the same page regarding their cybersecurity operations.

Ilan Barda, Co-Founder & CEO of Radiflow

The goal of any cybersecurity team is to minimize the attack surface so they can better focus resources. Implementing an Identity-based access control concept, which involves adding a monitored, consolidated, secured single point of entry, improves the reliability of remote access to critical network management. It not only reduces the chance of production downtime, brand reputation harm, and compliance fines but also enhances overall security by adopting a 'never trust, always verify' approach.

Jake Alosco, VP of Global Partnerships at Cyolo

Anomalous behavior can come in various ways, from a user gaining unauthorized access, to an authorized user forgetting to sign off, etc.. We continuously verify user connections, granting access solely to trusted entities such as authorized employees and third-party vendors.

NEW REPORT:
Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness
Author

Principle Analyst and Senior Editor | IP Networks

Ariana specializes in IP networking, covering both operator networks - core, transport, edge and access; and enterprise and cloud networks. Her work involves analysis of cutting-edge technologies that drive application visibility, traffic awareness, network optimization, network security, virtualization and cloud-native architectures.

She can be reached at ariana.lynn@thefastmode.com

PREVIOUS POST

Sprint to Showcase Live 5G Demo in Copa Soccer Stadium

NEXT POST

STC Signs New Contract with Intelsat to Grow VSAT Services