Executive View: Radiflow SCADA Security Suite - 80053

Report Details

Radiflow SCADA Security Suite is a comprehensive set of hardware products, software solutions, and managed services offering risk-based insights into ICS/SCADA networks, intelligent detection of IT and OT-related cyberthreats, as well as proactive protection against any deviations from established security policies.


Date Title
Jul 26, 2019

Executive View: Radiflow SCADA Security Suite - 80053

Radiflow SCADA Security Suite is a comprehensive set of hardware products, software solutions, and managed services offering risk-based insights into ICS/SCADA networks, intelligent detection of IT and OT-related cyberthreats, as well as proactive protection against any deviations from…

Read on KC PLUS

Latest Related Reports

Leadership Brief

Leadership Brief: How to get a Grip on OT Cybersecurity - 72573

With the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT is inevitable, so get started now on getting a grip on your OT Cybersecurity.

Leadership Brief

Leadership Brief: Mit den VAIT zu einer transparenteren Versicherungs-IT - 80388

Mit dem im Juli 2018 final vorgelegten Dokument „Versicherungsaufsichtliche Anforderungen an die IT“ (VAIT) gibt die BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht) Versicherungsunternehmen konkretere Vorgaben für die Umsetzung ihrer Geschäftsprozesse…

Executive View

Executive View: Senrio Insight - 72525

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive nonintrusive network device discovery to provide visibility and analytics of industrial device behavior and rapid detection of abnormal activities.  

Leadership Brief

Leadership Brief: A Practical Approach to Enterprise Security Architecture (ESA) - 70222

An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected given a customer’s unique business, security, and compliance requirements.

Advisory Note

Advisory Note: Sustainable Infrastructures through IT Compliance - 72025

Well-designed, state-of-the-art compliance programs help in maintaining an adequate IT architecture and its underlying processes. Forward-thinking organisations understand compliance as a strategic and future-oriented business objective, and embed IT Compliance and security into their…

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Leadership Brief

Leadership Brief: Join the Dots: Operational Technology and Informational Technology - 72012

One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technology” systems have much to benefit from interconnection with IT networks.  

Vendor Report

Vendor Report: AlertEnterprise - 71048

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

Executive View

Executive View: Waterfall Unidirectional Security Gateway - 71291

Waterfall Unidirectional Security Gateway technology combines specialized security hardware with a broad range of supported industrial protocols and applications to provide a level of network security unattainable by traditional firewalls.

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Microsoft Partnership Enables Security at Firmware Level

Microsoft has partnered with Windows PC makers to add another level of cyber attack protection for users of Windows 10 to defend against threats targeting firmware and the operating system. The move is in response to attackers developing threats that specifically target firmware as the IT industry has built more protections into operating systems and connected devices. A trend that appears to have been gaining popularity since Russian espionage group APT28 – also known as Fancy Bear, [...]

Latest Insights

Hot Topics

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00