Services

Stay Informed

Keep up to date on threats and risks relevant to your organization

ICS Threat Intelligence
Vulnerability Intelligence
Analytical Reports on ICS threats and vulnerabilities on the Kaspersky Threat Intelligence Portal
Reports and alerts about cyberattacks on industrial enterprises and vulnerabilities in industrial software and equipment; regular threat overviews for industrial automation systems available through the web portal and API
Threat landscape analysis on request
Preparation of a detailed analytical report on threats, incidents, and vulnerabilities relevant to the territory, industry or infrastructure specified by the customer
Analysis of known ICS vulnerabilities for critical information security decision-making
Kaspersky ICS Vulnerability Database provides exclusive, highly accurate information on vulnerabilities in industrial hardware and software. It comes with recommendations on how to minimize the risk of these vulnerabilities being exploited, as well as flexible information delivery options to effectively prioritize risks, protect critical assets, and make informed decisions about information security.
Learn more
ICS Vulnerability Data Feed
Regularly updated feed of verified and refined data on vulnerabilities in ICS software and equipment in machine-readable format

Get Ready

Empower your workforce with cybersecurity knowledge

ICS Security Awareness
In-depth Professional Training
Instructor-Led Training
Industrial cybersecurity awareness trainings for IT, information security and ICS specialists and for managers at industrial enterprises provided in-class or online
Self-Study Online Training
Online industrial cybersecurity course on the Kaspersky Automated Security Awareness platform (ASAP)
Digital forensics and incident response in ICS
Training covering appropriate cybersecurity incident response tactics and incident investigation methods.
Learn more
IoT Vulnerability Research
Training in (I)IoT vulnerability research
Fuzzing-Based Vulnerability Research
Training in modern fuzzing-based methods, techniques and approaches for software vulnerability research

Respond

Expert handling of security incidents using our professional services

Threat Hunting and Detection
Incident Response
Analyst Inquiry Service
Free
Threat Hunting and APT Investigation
Joint investigation of APTs and other cyberattacks targeting an industrial organization, exchanging indicators of compromise with other organizations and independent researchers
ICS Malware Data Feed
Stream of data (IOCs, hashes, IDS rules, Yara rules) on threats identified by ICS CERT experts in ICS systems, designed to simplify and automate attack detection and investigation
Incident response at industrial enterprises
Assistance in blocking an active cyberattack, investigating the cybersecurity incident and mitigating its consequences.
Learn more
Digital Forensics
Analysis of artifacts from cybersecurity incidents affecting industrial organizations and critical infrastructure facilities
Development of incident response handbook and training
Development of an ICS cybersecurity incident response handbook tailored to the organization’s specific environment and infrastructure. Training for staff to ensure they have the necessary skills and knowledge for proper incident response.
Learn more
Ask the Analyst
Request additional information* from our experts, including information on threats and threat statistics for a specific region/industry, malware, vulnerabilities, ICS/OT related security regulations or standards. *Provided through the Kaspersky Threat Intelligence Portal

Transform

Rethink your approach to cybersecurity from the ground up

Cybersecurity Assessment of Products and Solutions
Generic Information Security Consulting
Product security maturity assessment
Security assessment of IoT/IIoT/M2M products, as well as their development and support processes, with a publicly recognized security maturity certificate issued for assessed products.
Product Design Cybersecurity Assessment
Evaluating the cybersecurity of a product’s architecture and protocol specifications and providing recommendations on improvements
Product Vulnerability Assessment
Analyzing pre-release versions of products for vulnerabilities, developing customized tools and recommendations to address any security issues
Policies and Procedures
Analyzing whether an industrial enterprise’s information security policies and procedures meet their specified goals and requirements
Methodology and Frameworks
Developing methodologies and approaches to define information security requirements for industrial facilities plus methods for security analysis and the assessment of risks associated with cybersecurity incidents
Regulation and Standards
Providing advice and developing custom reports on standards, recommendations and regulatory requirements for the information security of industrial facilities and systems
Want to be the first to know about new materials?

Sign up for our newsletter and stay up to date on company events!