Cybersecurity management company Skybox Security announced a solution to improve network visibility in information technology and operational technology. In partnership with Wipro Limited, an IT consulting and business process services company, this new solution will help organizations better protect their hybrid IT/OT networks and ensure the security of their core infrastructure.
“Securing operational technology (OT) has always been problematic; this is technology that runs on outdated systems, has unsecured connections and is often impossible to patch,” Uri Levy, Skybox Security’s VP of Global Channels, GSIs and Strategic Alliances, said in a press release. “These problems are worsening as legacy OT devices are becoming unavoidably linked with more internet-connected technology and applications. The only way to tackle the overarching issues with OT security is by developing unified strategies and solutions. That’s why we have existing integrations with CyberX, SCADAFence Claroty, Indegy and ForeScout,. And it’s a big driver behind our new relationship with Wipro: now, we can provide IT-OT security that is agnostic to any customer deployment.”
The new solution is designed to increase network visibility of the IT/OT attack surface. This will allow organizations to avoid misconfigurations, understand vulnerability exposure, identify access policy violations, tackle weak security controls and improve change management capabilities.
“Where Skybox offers unrivaled, context-rich visibility across the entire security estate, Wipro will facilitate strategies that will break down internal, organizational challenges that restrict effective communication and collaboration across different teams, technologies, processes and objectives,” Mark Brown, Partner and Global Practice Head of OT & IoT Security, Wipro Limited, said in the release. “Organizations with hybrid IT-OT networks know that they’re living on a knife-edge. This partnership will enable them to understand exactly how their IT and OT networks are connected, to passively discover vulnerabilities within traditionally undocumented OT networks and find alternatives to patching when it isn’t an option.”
Users will be able to analyze paths between corporate and production networks with an interactive, visual model of the complete IT-OT attack surface. This will enable security teams to identify risky connectivity within IT/OT networks, verify policies are being followed, and evaluate potential threats.