Intrusion Detection System
Comply with legal requirements and detect cyber attacks in power grids.
OT/ICS Asset Inventory
Better OT asset inventory & vulnerability management: Enhance operations with detailed info, active queries, resource management & system integration.
OT/ICS Vulnerability Management
Comprehensive OT vulnerability management: Identify risks, protect facilities, respond to threats. Gain cybersecurity insights and detect vulnerabilities.
Functional Monitoring
Detect cyber threats, communication problems, and config errors. Benefit from advanced notification and interoperability testing.
Utility Industry
Ensure power grid cybersecurity by detecting and responding to threats in generation, transmission, and distribution.
Industrial Power Supplier
Protect your industrial power supply from cyber threats with our customized solutions and avoid potentially catastrophic consequences.
Infrastructure Industry
Benefit from comprehensive cybersecurity, addressing cyber threats in railways and water treatment despite resource limitations.
Consulting
Enhance your defenses, counter evolving threats, and secure your network effectively with our comprehensive services.
Trainings
Strengthen your knowledge, adapt to new challenges, and enhance your capabilities with our tailored training programs and expert guidance.
Gain valuable insights and practical knowledge from our team of ICS experts to enhance your cybersecurity defense against adversaries.
Unmasking 802.1x Vulnerabilities
Without network access control (NAC), anyone can plug into the Ethernet switches of critical control networks in substations, power plants, or control centers and send commands to the devices.
NIS2 - Is It a Miss Too?
Today, October 17, 2024, is the deadline for EU Member States to transpose the NIS2 Directive (2022/2555) into national law. It was adopted in December 2022 and requires that national laws on cybersecurity be published by today and enter into force.
Patch Management in Power Grid Substations
Patching assets in power grid substations is a complex task fraught with challenges unique to the OT environment.
Which Logs to Collect in a Power Grid OT Environment?
In the majority of young security programs, questions regarding logs arise at an early stage. With the introduction of a SIEM, it is crucial to consider how to integrate operational technology (OT) into the predominant information technology(IT) infrastructure.
The Hidden Dangers of Windows in OT Networks
Windows devices are omnipresent in information system environments due to their ease of use, wide range of applications, and compatibility. However, their presence in operational technology (OT) networks presents significant security challenges.
Past & Future Disaster Recovery for the Power Grid
On this first episode of our new miniseries, Andreas Klien and Simon Rommer, explore the critical roles of IT and OT in cyber incident response and disaster recovery.
Internet-Connected OT Devices
Are your operational technology (OT) devices connected to external networks? Thanks to convenient features like update capabilities and remote connections, the answer is likely positive. This presents an alarming but often overlooked threat.
Critical Vulnerability in Siemens OT Systems
NIST has identified a vulnerability in SICAM SCADA systems that could allow an unauthorized individual to gain administrator rights on the OT systems.
Advisories and How to Use Them
We look at the diverse world of security advisories and how to use them, and the wealth of experience of our experts in developing our OMICRON advisories.
Minimizing Cybersecurity Vulnerabilities at the Hardware Level
Why do hardware devices, in addition to software, need to be secured against cyber threats. OMICRON hardware developer Marcel Ströhle is the guest.
Firewalls Under Attack - How to Protect Your IT/OT Systems
Firewalls are the first line of defense in protecting critical infrastructures in cyberspace. This makes them particularly attractive to attackers.
StationGuard 2.40 – New Usability Upgrades
The new version brings along many usability upgrades, incl. MMS server availability, improved router behavior, and more …
Cracking the Code: How to Uncover Cyber Attacks on Your System
Learn how the OMICRON cybersecurity experts analyze incoming alarms and reveal hidden dangers that threaten the safety and operations of an entire system.
Vulnerability Management in Practice
Gather advisories, update your GridOps vulnerability database, tend to your asset inventory, vulnerability matching, and risk assessment.
NIST Cybersecurity Framework 2.0 at a Glance
On February 26, 2024 the National Institute of Standards and Technology (NIST) published the second version of the NIST Cybersecurity Framework (CSF 2.0).
State of the Art in Vulnerability Management
With the German IT Security Act, energy utility operators are required to adhere to the "state of the art" to manage cyber risks effectively.
OMICRON Contributes to Nmap Plug-In
We collaborated with the BSI and the Fraunhofer Institute to develop an nmap plug-in for OT networks, enhancing tools for power grid administrators.
Chances & Risks of Operational Technology in the Energy and Aviation Sectors
Andreas Klien discusses the differences and similarities of using OT technology in the aviation and electrical power industry sectors with his guest, Ron Brash.
Building trust in digital products used in the power grid
In this podcast episode, Andreas Klien, discusses the security engineering of digital products used in the power grid with his guest, Sarah Fluchs.
Experiences & Innovations in Developing Cybersecurity Products
In this podcast episode, Anastasiya and Jaques share their experiences, challenges, and innovations in developing our cybersecurity products.
StationGuard Receives Security Certificate from the BSI
The German Federal Office for Information Security (BSI) has tested our StationGuard and awarded us the IT security certificate (BSZ) as a result.
Attention CVE-2023-45871 - Our Story of Finding and Patching a Critical Vulnerability in Linux
You think your linux devices are immune to cyber attacks just because there's no official security advisory? You might be wrong.
Solving Cybersecurity Problems in Electrical Power Networks
OMICRON cybersecurity analysts Christoph Rheinberger and Eric Heindl share their personal experiences for IT and OT security officers.
Why do OT networks need an IDS?
Discover the challenges faced by power providers and practical recommendations for enhancing OT network security.
StationGuard 2.30 – Improved Efficiency for Intrusion Detection
With StationGuard 2.30, you can imrove your workflows. The intrusion detection system (IDS) enables you to monitor Ethernet networks in the power grid.
Digital Transformation in the Power Industry
In this podcast episode, learn how to successfully implement cybersecurity into critical power system infrastructures with OMICRON cybersecurity experts.
Vulnerability Management in Substations
Learn how vulnerability management tools ensure a more effective cybersecurity in power grids.
Bridging the gap between IT and OT
OMICRON cybersecurity expert Benjamin Teudeloff talks about the increasing necessity for power providers to improve their cybersecurity practices.
Security Assessment Findings in Substations and Power Plants
Our cybersecurity expert, Ozan Dayanc, reveals insights from global substation security assessments.
Cybersecurity from the Control Center to the Substation
Cybersecurity from the Control Center to the Substation - Stadtwerke Kempen is Building a New Substation with OMICRON
Feature Preview: Device Search in ZeroLine
StationGuard has a a new search feature that makes it easy to find all equipment information in your network.
Feature Preview: Automatic Device Classification
StationGuard 2.30 will include a new feature that makes it easier than ever to assess and secure your OT network.
Unmasking 802.1x Vulnerabilities
Without network access control (NAC), anyone can plug into the Ethernet switches of critical control networks in substations, power plants, or control centers and send commands to the devices.