Rhebo cooperates with the world's leading suppliers of industrial components to make the integration of OT Security even easier and more effective.
-
Easy Implementation of OT Cybersecurity
…through non-intrusive, lean integration in existing network components.
-
Optimization of Automation Processes
...through reporting of technical error states as well as efficient combination with other functions of the network components.
-
Integration in IT Security
...through connection to established security systems like Security Information & Event Management or firewalls.
Barracuda Networks
Integration of Rhebo Industrial Protector on SecureConnector (via Edge Computing) and with direct connection to the Barracuda CloudGen Firewall.
Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection
- IoT and OT Threat Intelligence for the Firewall via Edge Computing on SecureConnector
Benefits
- OT visibility and asset inventory
- Pro-active firewall policy configuration
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilities
- Detection and management of occurring changes on fieldbus level
Bosch Rexroth
Integration of Rhebo Industrial Protector on ctrlX AUTOMATION platform and IoT Gateway Protected Edge (PC PR21).
Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for IoT Gateway Protected
Benefits
- OT visibility and asset inventory
- Pro-active firewall policy configuration
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilities
- Increased plant availability through reporting of technical error states
IBM QRadar
Integration of Rhebo Industrial Protector on IBM QRadar SIEM via QRadar App.
Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for IBM QRadar SIEM
Benefits
- OT visibility and asset inventory
- OT threat intelligence for IBM QRadar SIEM
- Eingrenzung neuartiger Angriffsaktivitäten
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilities
- Increased plant availability through reporting of technical error states
Innogy Cyberrange-e
Expert training for cybersecurity managers in critical infrastructures as part of the Innogy CyberRange-e training center.
Functions
- Introduction to the functionality and use of ICS monitoring with anomaly detection
- Support with the simulation of attack scenarios and mitigation processes
- Integration of Rhebo Industrial Protector in the CyberRange-e infrastructure for training purposes
Benefits
- Training of cyber security managers in the topics of industrial cyber threats, defense against advanced persistent threats, handling of anomaly detection
- Awareness raising regarding cyber threats to critical infrastructure
INSYS icom
Integration of Rhebo Industrial Protector on INSYS icom Smart Devices
Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for INSYS icom Smart Devices
Benefits
- OT visibility and asset inventory
- Pro-active firewall policy configuration
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states
Paessler
Integration of Rhebo Industrial Protector with PRTG Network Monitor
Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for Paessler PRTG Network Monitor
Benefits
- OT visibility and asset inventory
- Seamless intrusion detection systems
- Secure IT/OT convergence
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states
RAD
Integration of Rhebo Industrial Protector on RAD SecFlow-1v
Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for INSYS icom Smart Devices
Benefits
- OT visibility and asset inventory
- Seamless intrusion detection systems
- Intelligent monitoring from central ICS to substation level
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states
Splunk – SIEM extension into the OT
Integration of OT security events into the SIEM system
Functions
- Identification of OT assets
- Continuous OT network monitoring
- Intrusion and anomaly detection of security-related incidents and technical error states
- Forwarding of pre-qualified security events to the Splunk dashboard
- Utilization of Syslog and CEF standard
Benefits
- OT visibility and asset detection increase cyber security posture
- Early detection of novel and known cyber attacks, malicious activities and manipulation in the OT
- Identification and mitigation of 0-Day vulnerabilities
- Increased plant availability through reporting of technical error states
WAGO – open for your digital future
Integration von Rhebo Industrial Protector in WAGO Edge Computer & Edge Controller
Functions
- OT asset identification
- Continuous OT monitoring
- Anomaly detection of security incidents and technical error states
Benefits
- OT visibility and asset inventory
- Early detection and mitigation of known and novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilities
- Increased plant availability through reporting of technical error states
Welotec
Integration of Rhebo Industrial Protector on Welotec IEC 61850-3 Substation Server
Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- Threat intelligence for firewall configuration in remotely controlled facilities (i.e. substations)
Benefits
- OT visibility and asset inventory in substations
- Seamless intrusion detection systems from central ICS to substation
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states