Rhebo cooperates with the world's leading suppliers of industrial components to make the integration of OT Security even easier and more effective.
-
Easy Implementation of OT Cybersecurity
…through non-intrusive, lean integration in existing network components.
-
Optimization of Automation Processes
...through reporting of technical error states as well as efficient combination with other functions of the network components.
-
Integration in IT Security
...through connection to established security systems like Security Information & Event Management or firewalls.
Barracuda Networks

Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection
- IoT and OT Threat Intelligence for the Firewall via Edge Computing on SecureConnector
Benefits
- OT visibility and asset inventory
- Pro-active firewall policy configuration
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilities
- Detection and management of occurring changes on fieldbus level
Bosch Rexroth

Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for IoT Gateway Protected
Benefits
- OT visibility and asset inventory
- Pro-active firewall policy configuration
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilities
- Increased plant availability through reporting of technical error states
IBM QRadar

Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for IBM QRadar SIEM
Benefits
- OT visibility and asset inventory
- OT threat intelligence for IBM QRadar SIEM
- Eingrenzung neuartiger Angriffsaktivitäten
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilities
- Increased plant availability through reporting of technical error states
Innogy Cyberrange-e

Functions
- Introduction to the functionality and use of ICS monitoring with anomaly detection
- Support with the simulation of attack scenarios and mitigation processes
- Integration of Rhebo Industrial Protector in the CyberRange-e infrastructure for training purposes
Benefits
- Training of cyber security managers in the topics of industrial cyber threats, defense against advanced persistent threats, handling of anomaly detection
- Awareness raising regarding cyber threats to critical infrastructure
INSYS icom

Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for INSYS icom Smart Devices
Benefits
- OT visibility and asset inventory
- Pro-active firewall policy configuration
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states
Paessler

Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for Paessler PRTG Network Monitor
Benefits
- OT visibility and asset inventory
- Seamless intrusion detection systems
- Secure IT/OT convergence
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states
RAD

Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- OT Threat Intelligence for INSYS icom Smart Devices
Benefits
- OT visibility and asset inventory
- Seamless intrusion detection systems
- Intelligent monitoring from central ICS to substation level
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states
WAGO – open for your digital future

Functions
OT asset identification
Continuous OT monitoring
Anomaly detection of security incidents and technical error states
Benefits
OT visibility and asset inventory
Early detection and mitigation of known and novel attack patterns
Identification and mitigation of Zero-Day vulnerabilities
Increased plant availability through reporting of technical error states
Welotec

Functions
- OT asset identification
- Continuous ICS monitoring
- Anomaly detection of security incidents and technical error states
- Threat intelligence for firewall configuration in remotely controlled facilities (i.e. substations)
Benefits
- OT visibility and asset inventory in substations
- Seamless intrusion detection systems from central ICS to substation
- Mitigation of novel attack patterns
- Identification and mitigation of Zero-Day vulnerabilitiesn
- Increased plant availability through reporting of technical error states