Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Software

Hall 7 / Booth Number 7-319

GREYCORTEX Mendel Industrial IDS

Video

south_east

Categories

Asset management / IT documentation Physical IT-security Network security

Key Facts

  • Cybersecurity Visibility Gain a comprehensive understanding of your network's complexity while enhancing threat detection and policy monitoring. With Mendel's detection capabilities through IDS, network behavior analysis, and full access to most OT protocol fields, you'll have the upper hand in safeguarding your critical assets.
  • Asset Inventory OT cybersecurity begins with knowing your assets. Get a complete picture of your network and business applications through both active and passive asset discovery and advanced tagging. This empowers you to effectively manage and protect your valuable assets.
  • OT Metrics Visualize your OT metrics, as you are used to in your current SCADA, alongside cybersecurity events. Our intuitive graphs allow you to monitor and analyze your operational technology performance seamlessly.

Product Description

GREYCORTEX Mendel’s ICS module is an advanced industrial Intrusion Detection System (IDS) based on deep packet inspection (DPI) of ICS and SCADA traffic. Using traditional detection techniques as well as advanced artificial intelligence and machine learning, it detects both common and undocumented cyber attacks, behavioral anomalies, vulnerabilities and misconfigurations.
... read more

Download product information

Watch our product video

external video thumbnail
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.