CyberX announces participation in the GE Digital Alliance Program

  • December 06, 2018
  • News
CyberX announces participation in the GE Digital Alliance Program
CyberX announces participation in the GE Digital Alliance Program

December 6, 2018CyberX, the IIoT and industrial control system (ICS) security company, announced the company’s participation in the GE Digital Alliance Program, a partnership of companies dedicated to growing the digital industrial ecosystem. At the same time, the company announced that its industrial cybersecurity platform has been installed in GE Power’s integration environment to support joint GE and CyberX customers with interoperability validation testing.

The Industrial Internet of Things (IIoT) is unlocking new levels of productivity, helping organizations improve safety, increase output, and maximize revenue. At the same time, digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface and risk of dangerous cyberattacks on industrial control systems.

CyberX is currently partnering with GE’s global community including GrayMatter, GE’s No. 1 software channel partner and a CRN “IoT Innovator.” GrayMatter’s customers include global organizations implementing a range of Smart Manufacturing, Smart Building, and Smart Water initiatives.

CyberX’s agentless OT security platform enables joint customers to auto-discover their assets and network topology, identify critical vulnerabilities and attack vectors, and continuously monitor their OT networks for destructive cyberattacks such as WannaCry, NotPetya, and TRITON.

CyberX’s industrial cybersecurity platform was recently used by NIST to recommend new ways of securing manufacturing industrial control systems. NIST’s published report shows how CyberX immediately detects anomalies such as unauthorized devices, network scanning, unauthorized PLC logic downloads, and communication using undefined function codes in ICS protocols, which can indicate attempts to exploit known vulnerabilities in ICS devices.

Learn More

Did you enjoy this great article?

Check out our free e-newsletters to read more great articles..