Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Tripwire Industrial Edge – The New Method of Visibility for Industrial Networks
  • Data Breach
  • Vulnerabilities

Tripwire Industrial Edge – The New Method of Visibility for Industrial Networks

4 years ago Jessica Wibawa
Tripwire Industrial Edge – The New Method of Visibility for Industrial Networks

When was the last time you thought about all of the devices running on your network? Think of your home network and how deceptively simple it appears. A full inventory of that network would probably surprise you, as it would show all of the devices that you may have forgotten about as well as a few of the neighbor’s devices that are piggy-backing off of your Wi-Fi. This visibility is often shocking to many people.

Now, think of a larger network consisting of hundreds of devices. Gaining full visibility into all the devices on a corporate network can be a stunning experience. If you go one step further and imagine an industrial network, the scope of discovery can be almost unimaginable. Industrial networks such as those that control water treatment facilities, oil pipelines, and gas distribution can exceed thousands of devices of varying types and ages. This makes gaining visibility very difficult and even more important because it can affect uptime, safety, and reliability.

Challenges for Industrial Networks

One reason that a full inventory is difficult to achieve is due to the sheer complexity of these networks. Not only are they complex in their architecture, but they are also vast in their topographical layout.

Another challenge that prevents greater visibility is that there are disparate manufacturer devices spread throughout the network. Some environments cannot simply have a sensor deployed or an agent installed to discover assets without causing a possible service disruption, something which can be catastrophic in an industrial setting. 

Introducing Tripwire Industrial Edge

Tripwire recently released a new product, Tripwire Industrial Edge. Powered by industrial cybersecurity firm Claroty, Tripwire Industrial Edge provides full visibility into an industrial network. Tripwire Industrial Edge overcomes the challenges of agents and sensors by using a standalone executable file. It is a highly flexible, Windows-based data collector that delivers 100% visibility into industrial networks in just minutes without requiring network changes, utilizing sensors, or having any physical footprint whatsoever. 

Tripwire Industrial Edge reports not only full hardware specifications for these devices but also the deployed configuration information. To get rid of it, you can just delete the executable. It doesn’t change the registry, and it doesn’t install any local files. It doesn’t do anything permanent. It is a non-persistent, self-contained file, and it makes network assessments very simple.

The executable is portable. You can have someone walk through a plant with a laptop to quickly and safely gather information from MAC addresses to firmware versions on each device.

How Does It Work?

Network discovery can start with UDP broadcast packets using common industrial protocols such as EtherNet/IP, Schneider Modicon, or Profinet. A ping sweep can then be used to try and identify neighboring devices. All of these protocols are already present in industrial networks, making these techniques incredibly low-risk. Tripwire Industrial Edge can use queries with these as well as other native ICS network protocols.

When a network is architectured in such a way that it is impossible to install a sensor in a particular location, Tripwire Industrial Edge makes it possible to discover assets present in that location. Cost of deployment is minimal because no additional hardware is required to install a sensor.

This asset information is sent to Tripwire Industrial Visibility where you can see all of the asset details such as firmware version, model number, installed patches, rack slot data, and more to identify the risks and vulnerabilities that are applicable to the Windows machine and its neighboring devices.

How Does Tripwire Industrial Edge Fit into the Industrial Portfolio?

Tripwire Industrial Edge is just one simple method to gain visibility into your OT network. It is an easy, quick starting point to begin your cybersecurity journey or gain visibility into areas of your network that are not as accessible.

Tripwire Industrial Visibility leverages the broadest and deepest OT protocol coverage in the industry to provide comprehensive visibility and asset management controls. It can utilize data collected from Tripwire Industrial Edge or various other scanning methods purpose-built for industrial networks: passive, active, hybrid or integrated. Tripwire offers complete visibility into your OT, IoT, and IIoT assets; connections; and processes in a scalable manner that can be effortlessly managed across multiple sites.

Are you interested in learning more about how Tripwire Industrial Edge can help your business today? Request a demo and have one of our experts walk you through it: https://www.tripwire.com/contact/request-demo.

The post ” Tripwire Industrial Edge – The New Method of Visibility for Industrial Networks” appeared first on TripWire

Source:TripWire – Jessica Wibawa

Tags: Low Severity, TripWire

Continue Reading

Previous Crypto-Exchange BitMart to Pay Users for $200M Theft
Next Latest Firefox 95 Includes RLBox Sandboxing to Protect Browser from Malicious Code

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

20 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT