Sectra managed detection and response

Ensure continuous operations and delivery

A holistic approach to security is required to ensure continuous operations and delivery. Sectra has an extensive experience within managed detection and response, and offers different capabilities that can help your operations achieve a balanced security level over time, thereby reducing the risk of external threats and internal risks.

We provide Sectra managed detection and response as a service in close partnership with our customers, adapted to their needs and resources. With our security expertise, threat intelligence approach and technologies, all of which enable a holistic security solution, customers can make use of the technological opportunities available today without increasing exposure to threats or risks.

Balanced security over time

The dependency on ICS/SCADA, as well as other IT systems, is constantly increasing. Balanced security over time – which entails the ability to manage risks during digitalization projects – is therefore important. We will help you find the right balance of security that fits your organization and helps you overcome the main challenges in order to achieve your goals.

Achieving balanced security over time requires operations to act on risks instead of acting on attacks or the consequences of an incident. By detecting and identifying threats and risks in time before they have caused real damage, operations can achieve balanced security over time, thus ensuring continued function and deliveries.

Availability 24/7/365

Security and risk management of IT and OT networks is a vital activity and an important aspect in making digitalization more efficient, thus enabling you to achieve your goals of efficiency, availability and profitability. However, digitalization entails new risks and threats that could easily jeopardize your operations. To avoid production outages and loss of revenue, your external and internal risks need to be measured and managed over time. The most successful companies are those that utilize both information technology (IT) and operating technology (OT) opportunities while ensuring continuous operation.

Detection and Response

We ensure the visibility required for early risk and threat detection so that the continuity of your operations is not jeopardized. With a few network sensors and well-chosen log sources, we can ensure that in just a matter of days you will achieve visibility and management of security risks that authorities demand for critical infrastructure. Our security analysts and incident responders will be available for your operations in our round-the-clock security operation center (SOC) that specializes in ICS/SCADA.

Network monitoring and detection

With this detection technology your industrial control system (ICS) network traffic will be identified and analyzed to minimize risks that could constitute a threat against maintaining continuity in operations. This capability detects deviations in the networks by using a monitoring service that reacts proactively to potential threats and risks. Therefore, measures can be taken before the deviations can lead to serious consequences.

Log monitoring and detection

Security-critical log events are with this detection technology collected from various critical systems in operations (e.g. from IT/OT networks, switches, firewalls and servers). All information on security-critical events—suspicious login attempts, for example—are grouped, and a picture of a potential threat or incident in progress can be rapidly obtained by correlating data from many different sources.

Incident response

From protected locations in a 24/7 security operations center (SOC), all the information from the different detection capabilities is gathered and analyzed. The traffic is first analyzed in advanced systems, then Sectra’s security analysts take over in the event of an incident to dig deeper and deal with the incident so that operations can quickly return to normal.

We assist you in your evaluation of the incident and contribute expertise, experience and analysis methods. Sectra’s team of analysts and incident responders are always available by telephone.

Other products for a balanced security

Helps you to identify strengths and weaknesses in your organization’s ability to protect, detect and manage security related risks. The assessment is done both from an overall technical perspective and from an operational perspective. The main purpose is to identify those risks that may affect the ability to deliver critical services such as water, electricity or heat. Learn more.

In pace with increased digitalization, employees are becoming more mobile and need to work remotely. That is why the need for tools that can manage the sensitive or classified tasks of the operations is increasing. Sectra offers solutions for secure digital collaboration with end-to-end encryption as well as secure remote access.

Sectra Wire is a secure communication system for digital communication and remote collaboration that helps organizations maintain a high level of security even when working remotely. You will find more information about Sectra Wire here.

Sectra Mobile VPN is based on patented technology and was developed for the mobile society of today and tomorrow. The solution supports a secure mobile workplace on both Samsung and iOS, and helps the organization to exchange information and work remotely without compromising on security. You will find more information about Sectra Mobile VPN here.

The system notes deviations from normal movement patterns, and alarms are sent if movements or abnormal sounds occur in an area designated as prohibited. The system is also

equipped with sensors that can identify suspicious sounds. Video streams are analyzed in real time using artificial intelligence, and all suspicious activity is reported directly to the operations.

Creates expanded security awareness for users, and staff are continually trained in managing information security. Security culture is thus improved and the risk of human error leading to serious consequences for operations decreases. Moreover, the system can easily detect malicious insiders as well as external threats that exploit internal resources.

Meet us next at