Skybox Security and Indegy Integrate to Strengthen Cybersecurity in Critical Infrastructure, Manufacturing

By : |May 13, 2019 0

Skybox Security has announced its integration with Indegy to help ­­organizations better understand the security posture of hybrid IT and operational technology (OT) networks.

“OT networks have been a mystery to IT security teams,” said Amrit Williams, Vice President of Products, Skybox Security. “But more and more, CISOs are being tasked with getting a handle on security in OT environments. That starts with literally being able to see and understand the connections between the corporate and production networks, visualizing how the two impact one another’s risk of attack. Our integration with Indegy further strengthens the visibility and insight we give customers with hybrid IT-OT networks, so they can accurately prioritize and respond to those risks.”

The integration between Skybox and Indegy provides customers with seamless visibility of their IT and OT networks. The combination of Indegy’s passive and active data collection from the OT network is relayed to Skybox where OT assets, services and vulnerabilities are modeled alongside those from the IT environment. With Skybox’s understanding of the hybrid network topology and security controls, it can simulate access between and within networks, and determine the reachability of vulnerable assets. Skybox also provides more context to Indegy’s vulnerability data, highlighting exposed and exploitable vulnerabilities, prioritizing their remediation and generating tickets to kick off the workflow.

“Having a bird’s eye view of a hybrid IT-OT network is hugely valuable,” said Mille Gandelsman, CTO, Indengy. “Where Skybox provides a high-level view and insight into the corporate network, Indegy allows users to maintain deep visibility into industrial control system networks and device-level changes and provides rich, reliable information. Rolling these capabilities into a single solution will help align IT security teams with OT engineers to ensure cyber risks are understood and remedied without undue disruption.”

No Comments so fars

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.