Today’s convergence of the Internet of Things (IoT) and Industrial Control Systems (ICS) have increased the ease of malware attack in a compliance-laden security morass. The 2016 Ukraine power grid attack represents only one of the many such attacks throughout the world in the past five years.
Dangerous Online Attacks
The Dec. 17, 2016 cyberattack using Industroyer, also called Crashoverride, resulted in a loss of power to 800,000 residents when its malware invasion took down 60 power stations. Though it grabbed more attention than cyberattacks on South Korea, Japan and Ukraine railways and the Israeli and US utility ransomware attacks, computer assets, especially ICS systems, remain under constant threat and regular attack.
Threat perception continues to grow, with the number of ICS personnel who perceive a high level/severe level threat moving from 43% in 2015 to 67% in 2016.
For ICS personnel, the greatest concern remains systems operating commercial operating systems. Access as a Service and Ransomware attacks continue growing in frequency. While breaches once only threatened data loss, they now deny service on a large scale and not limited to computer access.
Web Application Firewalls
Two of the most essential protections include web application firewalls (WAF) and Runtime Application Self-Protection (RASP). The WAF protects web apps from cross-site scripting, SQL injection and many related types of web exploits. You define customized and managed rules to create your WAF policy, granting only control access you want to your web applications.
Runtime Application Self-Protection
RASP technology resides on the server, protecting applications from the moment they’re opened. It detects real-time attacks on applications, sounds an alarm and protects the application from malicious inputs.
Verse’s Combined Technologies Protect Better
Virsec goes further than either of these technologies, combining WAF- and RASP-like protections to produce an advanced security option for SecOps. You can protect any application without code changes or tuning.
Go further than other ICS personnel by installing to protect against online attacks like Industroyer. Leverage the power of protection that combines WAF and RASP technologies.