Subscribe and listen to AW’s podcast!
Subscribe and listen to the Automation World Gets Your Questions Answered podcast!
Listen Here

Cybersecurity Sensor

Cynash’s SerialTap cybersecurity sensor passively intercepts serial communications on legacy industrial control networks for threat analysis.

Cynash’s SerialTap cybersecurity sensor passively intercepts serial communications on legacy industrial control networks for threat analysis.
Cynash’s SerialTap cybersecurity sensor passively intercepts serial communications on legacy industrial control networks for threat analysis.

This hardware device seamlessly installs in supervisory control and data acquisition (SCADA) and other legacy control systems. Once installed on the serial network, it intercepts communications between various field devices and controllers. It then transforms the intercepted serial communications data into a data packet, which it sends out via the device’s integrated Ethernet port to a backend appliance and higher-level computing systems for critical systems monitoring, intrusion detection and asset management by the company’s suite of industrial cybersecurity tools. It operates like a traditional network tap or a mirrored port on a managed switch, and makes it appear that data from communicating devices is forwarded out of the Ethernet port. The device’s embedded computer parses and transforms the serial data passively, without adding any computational overhead or failure points to critical communication networks. Data sent out via the Ethernet port can be analyzed using third-party network security tools or the company’s Cynalytic, which combines a set of biomimetic and machine-learning technologies to identify emergent security threats.

>>For more information on this product, click here
Cynash, Inc.
www.cynash.com
408.945.8980

Revealed: sensor & AI secrets
New report features peers and pros on how machine vision, smart instrument sensors and AI can improve manufacturing.
Free Download
Revealed: sensor & AI secrets
Barriers to cyber-attacks
How to apply defense-in-depth cybersecurity strategy to protect your company. Learn from your peers in industry.
Download Playbook
Barriers to cyber-attacks