• admin

Deutsche Telekom and T-Systems Partner with CyberX to Secure Critical Industrial Infrastructures

Updated: Mar 1, 2019

Cyber attacks are the main drawback of installing an operations technology (OT) infrastructure – 59 percent of cyber security managers believe there is greater risk in OT than IT environments. A recent Ponemon Institute survey discovered nearly 70 percent of organisations sampled suffered a security compromise over the past 12 months resulting in loss of confidential information or operational disruption in their OT environments.

The European IT service provider, T-Systems selected CyberX – the industrial cybersecurity company protecting OT infrastructures worldwide – to help their customers continuously reduce risk from advanced cyberattacks on their critical industrial infrastructures. According to a press release, T-Systems chose CyberX after conducting a rigorous competitive evaluation of Industrial Control System (ICS), SCADA and IIoT security vendors.

We selected CyberX because of their innovative, best-in-class technology and world-leading expertise in industrial cybersecurity and threat intelligence,” said Dirk Backofen, Head of Telekom Security in the same release. “CyberX enables our customers to significantly reduce risk and strengthen their operational resilience, both today and as they implement new digitization initiatives. Our strategic partnership with CyberX enables us to offer a mature, field-proven solution that’s scalable and can be rapidly deployed.

The CyberX platform is said to reduce risk by continuously monitoring ICS networks for targeted attacks, ransomware, and industrial malware such as Black Energy. Purpose-built for OT cybersecurity, it incorporates patent-pending, machine-to-machine (M2M) behavioral analytics and proprietary ICS-specific threat intelligence to identity anomalous behavior in real-time. The platform provides deep network forensics for incident response with non-invasive risk assessment for top vulnerabilities such as unpatched ICS devices and unauthorized Internet connections to control networks.


18 views0 comments