CyberX development environment secures IoT devices
June 6, 2019
Massachusetts-based security company CyberX has announced an open development environment (ODE) that makes it easier for organisations to secure unmanaged IoT and industrial control system (ICS) devices running proprietary protocols.
The Horizon Protocol ODE lets users develop, test and deploy custom protocol dissectors for CyberX’s cyber-security platform, without divulging proprietary information about how the protocols are designed or sharing network packet captures that may contain sensitive information. Dissectors are plug-ins that decode network traffic so it can be processed by automated network analysis programmes.
With Horizon, users can quickly integrate custom dissectors into the CyberX platform and immediately leverage a broad array of automated deep packet inspection services, including: asset and firmware identification; risk and vulnerability management; continuous threat monitoring using patented M2M-aware behavioural analytics; and IoT and ICS threat intelligence.
The platform also provides built-in support for integrating with a wide range of security stacks used in modern SoCs from the likes of Splunk, IBM QRadar, ServiceNow, Palo Alto Networks, Cisco and HP Aruba.
Horizon addresses a key challenge for securing IoT and ICS environments because equipment vendors that design proprietary protocols typically do not disclose their technical information to third parties. And in many critical infrastructure and industrial organisations, it’s a violation of compliance regulations or corporate policy to share sensitive network traffic information with external organisations.
Horizon also helps users localise messages and reports into any language they choose, making CyberX accessible to organisations in any part of the world.
Additionally, Horizon is a flexible open framework enabling customers and partners to:
- Modify text in alerts and reports to meet organisational requirements;
- Customise support for standard protocols, such as when using non-standard ports; and
- Monitor dissectors in real time to understand how they’re performing in terms of memory, bandwidth and so on, and make sure they’re working correctly.
CyberX says its industrial cyber-security platform was built by blue-team experts with a track record of defending critical national infrastructure.