The industrial and manufacturing industry is the one of the most targeted sectors for cybercrime,
together with finance and government sectors.
According to IBM and the Ponemon Institute, the average cost of a data breach in the industrial
sector is above
$ 4 000 000
Cyberattacks can range from causing minor production disruption to inflicting serious damage to
machinery.
PUBLIC CASES
Oil tanking and Mabanaft (Germany)
Disruption of supply chains, conflict with Shell
Sea-Invest (Global)
Shutdown of terminals around the World
Saudi Aramco (KSA)
Data leak and an attempt to extort $50 million
Colonial Pipeline (US)
Complete shutdown for 5 days + Joe Biden announcement
RISK OVERVIEW
Potential Damage
Disturbance of technological (production) process
Theft of intellectual property
Catastrophic downtime of infrastructure
Extortion of funds
Physical damage
Confidential information leakage
Our Solution
How it works
On the basis of a single centralized platform, "traps" are created - digital twins of real
devices that initiate the connection of cyberattacks to themselves, protecting the
organization's real services.
Purpose
Verification and analysis of collected artifacts
Interaction with the attacker and collection of information
Monitoring of cyberattacks on any type of digital twins
Blocking the spread of cyber attacks in IT infrastructure
Information Security Alert
Deployment
Solutions for industrial sector
FV-DECEPTION system for monitoring and blocking cyberattacks on any type of device in the IT
infrastructure.
How it works
Detect connections to traps that simulate real enterprise services
Promptly notify security officers about the fact of an attack in real time
Interaction with the attacker in order to gather as much information about him as possible
Purpose
Traps can imitate any IT infrastructure objects: WEB server, FTP server, E-mail server,
Workplace, Firewall, OS, Router, Switch, IoT / IIoT equipment, etc.
The elements (sensors) are deployed on each company network (VLAN) and connected to the
management module
Each element (sensor) deploys a set of traps corresponding to real devices, computers and
services on the network
An additional important feature of the system is the built-in vulnerability scanner. Each
element (sensor) in the system can scan its network for vulnerabilities.
Scheme of work
Sensors
Sensors are located in subnets (VLANs), they scan and deploy traps.
The following information can be obtained for each sensor in the system:
Bait at users' workplaces
Traps that are installed in the subnet
Devices that were fixed at the time of the last scan