SC Awards

Finalists: Best SCADA Security Solution

The hacking of a water treatment plant only months ago demonstrated the risks often associated with critical infrastructure and the industrial control systems that many critical infrastructure entities rely upon to operate. From legacy considerations to access controls, the challenges facing these entities are distinct and alarming when one considers implications of a breach.

The technologies recognized in this category reinforce critical infrastructure security through both supervisory control and data acquisition (SCADA) offerings and solutions that tackle security associated with the internet of things. They respond the the array of threats, whether they be spearheaded by nation-state bad actors or organized criminals.

FINALIST | BEST SCADA SOLUTION

TENABLE.OT
Company: Tenable
Noteworthy: Leverages Tenable’s predictive technologies, including Predictive Prioritization, to combine vulnerability data, threat intelligence and data science for vulnerability prioritization.

FINALIST | BEST SCADA SOLUTION

THE SCADAFENCE PLATFORM
Company: SCADAfence
Noteworthy: In managing a baseline for each device and event separately, the baseline uses advanced AI and machine-learning algorithms, and has a built-in awareness to network changes, thus avoiding false positives.

FINALIST | BEST SCADA SOLUTION

TRIPWIRE ENTERPRISE FOR INDUSTRIAL DEVICES
Company: Tripwire
Noteworthy: Supports information technology and operational technology convergence by bringing OT capabilities and IT capabilities into one platform that spans the organization.

FINALIST | BEST SCADA SOLUTION

VANTAGE
Company: Nozomi Networks
Noteworthy: With continuously updated threat intelligence, Vantage identifies vulnerabilities on every system and generates alerts on malicious activity using signatures and behavioral-based detection technologies.

FINALIST | BEST SCADA SOLUTION

VERVE SECURITY CENTER
Company: Verve Industrial Protection
Noteworthy: Enables rapid remediation of vulnerabilities and threats from the same platform that is used to discover and assess those vulnerabilities, delivering a “closed-loop” solution.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds