Search
Close this search box.

Industrial Control Assessment

The LMNTRIX ICS Security Assessment is designed to use non-invasive methods to provide an assessment of an industrial facility’s overall cyber security posture.
This assessment is specifically designed to meet the needs of organizations concerned about the operational risk associated with aggressive probing, scanning, software agents, or other more aggressive security evaluation techniques. The LMNTRIX ICS Security Assessment combines a remote workshop-based ICS architecture review with detailed technical analysis of firewall configurations and active production ICS network traffic.
The LMNTRIX ICS specialists speak the language of Operational Technology (OT) and work directly with the engineers responsible for OT to adapt cyber security best practices appropriately for the ICS environment. We also work with IT security leaders to equip them with the domain knowledge and credibility required to engage their OT teams in effective cyber security discussions.

Our Approach

The LMNTRIX ICS Security Assessment includes a combination of ICS staff interviews combined with an active network assessment using virtual sensors deployed within client network.

Our approach includes the following services:

OT Asset Inventory

LMNTRIX leverages unmatched OT protocol coverage and Passive, Active, and AppDB scanning capabilities to deliver complete OT visibility and asset management controls.

Asset identification includes:

Threat Modelling & Controls Prioritization

Working closely with the client IT and OT teams we model and visually identify possible attacks on control systems to assist in prioritizing ICS control investments.

Network Segment Review

This review includes the efficacy of the configuration and rule-sets of network security devices, such as firewalls. We review existing network segmentation and automatically map and virtually segment OT networks into Virtual Zones, which are logical groups of assets that communicate with one other under normal circumstances.

Network segmentation review includes:

Threat Detection

LMNTRIX uses multiple threat detection techniques over a period of two weeks to provide full monitoring coverage of OT security and integrity events.

Detection methods include:

Vulnerability Assessment

LMNTRIX uses a non-intrusive method of comparing each asset in an OT environment to an extensive database of insecure protocols, configurations, and other vulnerabilities tracked by LMNTRIX, as well as to the latest CVE data. This allows us to identify, prioritize, and remediate vulnerabilities for clients to address.

The vulnerability assessment includes:
lmntrix-ally.webp

We help you

What You will get

right-xdr

Ready toGet Started?

Our security experts are standing by to help you with an incident or answer questions about our consulting and managed detection and response services.
Contact Sales
US +1.888.958.4555
AU +61.288.805.198
UK +44.808.164.9442
SG +65.3129.2639
HK +852.580.885.33
Shopping Basket

Thank you!

You'll be hearing from us soon!

In the meantime, you can subscribe to the LMNTRIX Blog and Labs research to receive educational articles written by security experts. You'll receive an email with our new blog posts.