Problem statement
The industrial and manufacturing industry is the one of the most targeted sectors for cybercrime,
together with finance and government sectors.
According to IBM and the Ponemon Institute,
the average cost of a data breach
in the industrial sector is above
the average cost of a data breach
in the industrial sector is above
$ 4 000 000
Cyberattacks can range from causing minor production disruption to inflicting serious damage to
machinery.
PUBLIC CASES
Oil tanking and Mabanaft (Germany)
Disruption of supply chains, conflict with Shell
Sea-Invest (Global)
Shutdown of terminals around the World
Saudi Aramco (KSA)
Data leak and an attempt to extort $50 million
Colonial Pipeline (US)
Complete shutdown for 5 days +
Joe Biden announcement
Joe Biden announcement
RISK OVERVIEW
Potential Damage
Disturbance
of technological (production) process
of technological (production) process
Theft of intellectual property
Catastrophic downtime
of infrastructure
of infrastructure
Extortion of funds
Physical damage
Confidential information leakage
Our Solution
How it works
On the basis of a single centralized platform, "traps" are created - digital twins of real
devices that initiate the connection of cyberattacks to themselves, protecting the
organization's real services.
Purpose
- Verification and analysis of collected artifacts
- Interaction with the attacker and collection of information
- Monitoring of cyberattacks on any type of digital twins
- Blocking the spread of cyber attacks in IT infrastructure
- Information Security Alert
Deployment
Solutions for industrial sector
FV-DECEPTION system for monitoring and blocking cyberattacks on any type of device in the IT
infrastructure.
How it works
- Detect connections to traps that simulate real enterprise services
- Promptly notify security officers about the fact of an attack in real time
- Interaction with the attacker in order to gather as much information about him as possible
Purpose
- Traps can imitate any IT infrastructure objects: WEB server, FTP server, E-mail server, Workplace, Firewall, OS, Router, Switch, IoT / IIoT equipment, etc.
- The elements (sensors) are deployed on each company network (VLAN) and connected to the management module
- Each element (sensor) deploys a set of traps corresponding to real devices, computers and services on the network
- An additional important feature of the system is the built-in vulnerability scanner. Each element (sensor) in the system can scan its network for vulnerabilities.
Scheme of work
Sensors
Sensors are located in subnets (VLANs), they scan and deploy traps.
The following information can be obtained for each sensor in the system:
The following information can be obtained for each sensor in the system:





