You are here

Radiflow Expands its OT SOC Partner Program in Collaboration with Yanai Engineering

12th April 2018

Program provides attractive model for partners to offer managed SOC services for improving cybersecurity and lowering costs for OT network operators

Radiflow, a leading provider of industrial cybersecurity solutions for critical infrastructure, in collaboration with the cybersecurity division of Yanai Engineering, today announced that the two companies are offering a new tool set to enable value added partners to provide managed Security Operations Center (SOC) services for operational technology (OT) networks with industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems.

As part of this OT SOC partner program, Radiflow and Yanai are providing a tool kit combining Radiflow’s state-of-the-art industrial cybersecurity solutions with Yanai’s unique methodology for integrating operational engineering with cybersecurity tools to Managed Security Service Providers (MSSPs) that want to enter the OT space.

A main component in this OT SOC tool kit is Radiflow’s iSID Intrusion Detection System. iSID protects OT networks and ICS and SCADA environments by alerting on breach attempts and cyberattacks into the OT network by flagging potential risks based on deep network learning and asset mapping.

The security alerts reported by Radiflow’s iSID are analyzed to evaluate their operational impact by an engineering methodology developed by Yanai based on its extensive expertise in industrial engineering combined with its ongoing research of cyberattacks in industrial operations.

Yanai is a prominent electrical engineering company based in Israel that launched its managed OT SOC in late 2017 using Radiflow’s iSID system in the network analysis layer and has since attracted numerous customers from the energy, water, building management and additional sectors from across the country.

“Our managed OT SOC service allows infrastructure operators to incorporate multilevel network security into their operations” said Emanuel Marynko, Chairman of Yanai.

Based on the successful deployment of this combined model for this OT SOC service, the companies are now offering this tool kit to their partners worldwide.

For the OT SOC operators, the tool set also includes Radiflow’s iSAP Smart Probe for collecting and transferring OT network traffic from customer sites to the managed SOC. The iSAP uses Radiflow’s patented mechanism to perform pre-processing of the local network traffic at the customer facility before securely and efficiently sending the relevant metadata to the iSID at the managed SOC.

For customer sites where an online link from the remote site to the managed SOC is not available, Radiflow provides its OT SOC partners with its iREC Recorder for passively capturing and sending network traffic data for offline analysis at the managed SOC.

“We are excited to provide a framework for our partners to offer managed SOC services to their industrial automation customers,” explained Ilan Barda, CEO at Radiflow. “The tools and methodology that we are providing are helping our partners better serve their customers with improved security, lower costs and shared resources, while creating a growth engine to drive their businesses forward.”

The managed OT SOC offering will also enable partners that are already working in the OT space to extend their service offering and provide their customers with ongoing managed security services.

“The main challenge in OT security is the correlation between the cyber and engineering aspects,” added Yishai Shafran, Head of the SCADA Cybersecurity Division of Yanai. “Our collaboration with Radiflow enables the fusion of these competences for the first time.”

“With the new OT SOC tool kit, our partners can deliver expert-level analytics, ensuring professional use of our monitoring tools that are installed,” continued Barda. “Further, our OT SOC tool kit enables our partners to analyze events from multiple customers and use trend information to quickly detect emerging threats.”

Related topics: