{"id":4943,"date":"2024-02-13T11:04:43","date_gmt":"2024-02-13T09:04:43","guid":{"rendered":"https:\/\/it-integrator.ua\/platforms\/ics-security\/"},"modified":"2024-03-12T11:17:36","modified_gmt":"2024-03-12T09:17:36","slug":"ics-security","status":"publish","type":"platforms","link":"https:\/\/it-integrator.ua\/en\/platforms\/ics-security\/","title":{"rendered":"ICS Security"},"content":{"rendered":"<p><span style=\"color: #a30404;\"><strong>Purpose:<\/strong><\/span> Construction of a system for monitoring and ensuring security of OT networks (location &#8220;on the ground&#8221;):<\/p>\n<ul>\n<li>automatic detection and visualization of OT network assets (technological workstations, servers, HMI, data archives, PLC, RTU, IED and network devices)<\/li>\n<li>tracking firmware and OS versions, active programs and users, serial numbers and configurations<\/li>\n<li>analysis of technological protocols and detection of anomalies in them<\/li>\n<li>integration with Tenable.sc, Tenable.io to build a comprehensive RiskBased Vulnerability Management process<br \/>\nopen API for integration with other organization systems<\/li>\n<\/ul>\n","protected":false},"featured_media":0,"template":"","class_list":["post-4943","platforms","type-platforms","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/platforms\/4943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/platforms"}],"about":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/types\/platforms"}],"wp:attachment":[{"href":"https:\/\/it-integrator.ua\/en\/wp-json\/wp\/v2\/media?parent=4943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}