Categories
Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems
High costs
Values
Reduce Costs
Ensure Security and Business Continuity
Nation-E Solution
Nation-E solution incorporates three main components that secure critical infrastructure, OT (operational technology) and IIoT (Industrial Internet of Things) systems.
About Product
Description
Nation-E’s solution offers a seamlessly integrated transparent security layer. It incorporates three main components that secure critical infrastructure, OT (operational technology) and IIoT (Industrial Internet of Things) systems:
Cerebrum
Nation-E’s Cerebrum analyzes the information collected by the Energy Firewall and provides a detailed dashboard, reports and alerts; in addition, Cerebrum integrates with existing SIEM (where applicable).
It detects and reports tampering, traffic abnormalities or behavioral deviations from a stated policy, provides immediate alerts on communication disruptions, allows incident response and assets isolation using Nation-E policy management. Cerebrum integrates with multiple 3rd-party incident response systems including the most common SIEM systems from IBM, Checkpoint and HP.
Energy Firewall
Nation-E’s Energy Firewall collects and orchestrates real-time information acquired by the Smart Agents.
It provides passive monitoring of the traffic, visibility into assets inventory and state, abnormal or risky traffic patterns, policy enforcement and real-time threat isolation and mitigation.
Smart Agent
Nation-E’s smart agents are attached to critical assets serial interface in order to monitor and secure. Assets may be network-connected or stand-alone, accessible via serial connectivity.
Our smart agents connect and communicate via encrypted and mutually authenticated tunnels, preventing rogue assets from posing a threat. They monitor common OT serial interfaces, CAN, RS232, RS485 and RS482, as well as common protocols such as OPC, DNP3 and MODBUS and BACnet.
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
IT Security Department in company