Plug & play USB scanning
A high degree of protection can be achieved by leveraging IOT security for a transiting USB device. Air-gapped environments are frozen in time and host unseen classes of malware, often via a transiting USB device between the OT and IT networks. Monitoring at a network security level does not enable organizations to prevent even accidental infecitons. Our plug & play USB scanning station is endowed with artificial intelligence technologies to prevent known, unknown and future forms of attacks, such as adversarial machine learning. This protects industrial IOT environments in various segments such as manufacturing, pharmaceutical, oil gas, shipping, drilling, and more inside this threat landscape. Featuring technologies include:
- Neural Networks
- Enforcement Driver
- Advanced Machine Learning
- File Reputation
Industrial IOT Environments
Your facility does have to be a target; accidental infections happen daily. Implement control points to protect against USB-borne malware, network intrusion, and zero-day exploits to industrial control systems with ICSP and CSP integration.
Utilities & Energy
Whether your industrial control system is 20 years old or modern-day technology, our IOT security solutions provide you a high degree of protection without replacing existing equipment, software or downstream operations.
Cyber criminals continue endangering patient safety by tampering with medical devices and continue to manipulate PHI and PII data. Deploy application whitelisting and sandboxing capabilities to prevent malware such as ransomware or spyware from installing and executing; control access to external hardware (e.g. USB) and the users / groups that can install applications on your medical IOT devices.
- Scans and eradicates malware that arrives via USB
- Algorithm-based instrumented signatures to cover large filesets
- Maintains information on prevalent threats and can retrieve information on all known vulnerabilities when cloud access is available
- A single signature can cover up to 100 variants of a malware
- Samples are executed in a lightweight virtual machine to cause threats to reveal themselves in an emulated environment
- X86 Emulation Obfuscated Threat
- JS emulation
- VBS/VBA emulation
Critical System Protection
Timeless, signatureless, policy-based endpoint security and compliance.
Building a cyber defense arsenal for IOT systems requires control points for a vast range of operating systems and device-specific threats. Our lightweight behavioral hardening engine is purpose-built to protect legacy and EOL systems, by adding layers of defense at the kernel level to prevent unhygenic operations to your endpoints. Naturalizing defense on fixed-function systems through our application whitelisting approach ensures IOT device security , freezing systems such that malicious content is unable to run. Critical System Protection isolates IOT devices from network intrusion, zero-day exploits, and other future forms of attacks. Features include:
- Streamlined Application Whitelisting
- Anti-exploit Techniques
- Supports Windows 2000/XP/10 & Linux
- Memory footprint less than 20MB
- CPU utilization of less than 1 percent
Don’t Detect, Prevent.
These solutions work together, and with the rest of the Symantec product portfolio, thanks to our Integrated Cyber Defense (ICD) platform. Unify cloud and on-premises security to provide threat protection, information protection and compliance across all endpoints, networks, email, and cloud applications. Our solutions enact control points with enterprise-ready proven solutions to protect your critical environments from both known and unknown attacks.
ICSP uses the world’s most advanced threat detection engine which has won AV-Test’s best protection
Symantec protects the worlds #1 ATM manufacturer from advanced adversaries and unknown malware.
Symantec is inter-operable with customers using Emerson industrial control systems.
“Symantec's core security technology combined with Wincor Nixdorf’s domain knowledge has resulted in a solution that offers best-in-class security against software attacks on ATMs.”
Global Product Manager
Software Security, Wincor Nixdorf
“As industry leaders for IoT trust, wolfSSL Inc. and Symantec combined solutions help developers secure against MITM, secure firmware updates, and encrypt data on device.”
Founder and CEO
“Providing secure, simple, and seamless authentication requires embedding certificates in IoT products. TI currently embeds Symantec's root certificate in multiple IoT devices.”
Director, Strategic Marketing – IoT
Texas Instruments (TI)