2. User/Device Context allows or denies access by user, device, device compliance status, time and purpose to the systems.
The Cyber-ECP is a linear chain of security controls with each control reducing the attack surface an adversary would have to attack an environment. Each control in the chain was specifically picked based on the various Tactics, Techniques, and Procedures (TTPs) adversaries use to breach an environment, and the most effective way to detect and protect against these TTPs.
By reducing the attack surface like Cyber-ECP™ has, an adversary is unable to pivot or test out various methods of breaching an environment without being detected. This also means that trusted employees and/or contractors that turn into insider threats can be detected early and prevented from impacting operations.
Unlike other solutions that require the end user to setup and configure the system with the hope it all works right, Red Trident built a solution that can be easily deployed with Red Trident supporting you along the way.
Red Trident’s team of highly skilled OT Cybersecurity professionals monitor and manage the Cyber-ECP™’s operations in our Security Operations Center (SOC), so your team can focus on making your product.
Cyber-ECP™ can easily be deployed in most OT networks to act as an OT Firewall at Purdue Levels 0-1, or to more complex routed environments at Purdue Levels 2-3. Well pads, tank batteries, electrical substations, pump and compressor stations, and remote telemetry sites are all addressable with this product.
The Cyber-ECP™ appliance is a small form factor, DIN rail mounted device that is as simple to connect to the network as plugging in a laptop. Once connected, Red Trident handles the rest of the work for you. Designed by OT professionals for OT Professionals.
Simple OT DMZ Cyber-ECP™ can be placed in a DMZ and control access to each device downstream. This setup is good if there is an existing Firewall in place and connections need to be phased over to the Cyber-ECP™
Complex OT DMZ Cyber-ECP™ can be placed above high value SCADA and DCS systems while still controlling user access to these system for both local technicians and remote workers/OEMs
Remote Sites Cyber-ECP™ can act as a demarcation point for remote sites that only have a cellular modem. Allowing secure access to data from the site and secure remote support of all devices on the site without impacting dataflow