Radiflow, creators of the leading OT cybersecurity platform, CIARA, on Tuesday announced a partnership with Cyolo to better secure remote access and further detect anomalous behaviors. This partnership ensures that access to and secure operation of OT/ICS networks and assets is continuously monitored and controlled, reinforced by swift and effective response to threats.
The increased connectivity from various vendors has resulted in a surge in authorized external users accessing OT networks remotely. However, this heightened connectivity also brings uncertainty surrounding the identity of users on the other end of a connection and the potential presence of threat actors. To ensure that only authorized users gain access, Radiflow has collaborated with Cyolo to establish a fully monitored, secured remote connectivity with comprehensive authentication and session validation capabilities. Additionally, the integration enables operators to rapidly block unauthorized/unrecognized sessions and sources of malicious traffic while swiftly containing malicious behavior and malware.
This not only heightens security but also provides a dual advantage for organizations struggling to fill employment gaps. The joint solution empowers operators to focus their resources and rapidly block unauthorized or unrecognized sessions and sources of malicious traffic. It enables them to promptly contain malicious behavior and the malware itself, ensuring uninterrupted operations without being forced to take downtime.
This effort continues Radiflow’s efforts in working with companies to identify the business’ most valuable assets and create an OT-security plan in a way that manages resources effectively. This approach creates strong alignment throughout organizations, ensuring that CISOs and other executives are on the same page regarding their cybersecurity operations.
Ilan Barda, Co-Founder & CEO of Radiflow
The goal of any cybersecurity team is to minimize the attack surface so they can better focus resources. Implementing an Identity-based access control concept, which involves adding a monitored, consolidated, secured single point of entry, improves the reliability of remote access to critical network management. It not only reduces the chance of production downtime, brand reputation harm, and compliance fines but also enhances overall security by adopting a 'never trust, always verify' approach.
Jake Alosco, VP of Global Partnerships at Cyolo
Anomalous behavior can come in various ways, from a user gaining unauthorized access, to an authorized user forgetting to sign off, etc.. We continuously verify user connections, granting access solely to trusted entities such as authorized employees and third-party vendors.