From October 10 to 14, 2022, Positive Technologies will participate in GITEX Global—the largest exhibition of information technology and consumer electronics in the Middle East. This year, over four thousand exhibitors from 170 countries and more than 100,000 visitors are expected at the event, which has taken place in Dubai since 1981.
Ivan Brylin, International Business Development Manager at Positive Technologies, says: «The countries of the Persian Gulf and Middle East are a promising market for our products and solutions, and with an ever-increasing number of cyberthreats worldwide, we expect the demand for the advanced information security technologies that our company offers to grow in this region. GITEX Global is a great opportunity to communicate face to face with our existing and potential customers, tell them about the advantages of our products and find the optimal solutions.»
At the exhibition, Positive Technologies’ leading experts will demonstrate the capabilities of the company’s products in a number of use cases:
- Malware detection in industrial networks. PT ISIM, a hardware and software suite for deep analysis of traffic, detects the presence of an intruder in the ICS networks. Thanks to native integration with PT Sandbox, PT ISIM detects the transmission of a suspicious object in the network and then extracts and transfers it to PT Sandbox for static and dynamic analysis. PT ISIM enables you to adjust the emulation environment (software composition, deception mechanisms) to the specifics of the target industrial company and detect known and unknown malware targeting the ICS components.
- SCADA password brute force. Someone makes several attempts to enter the password into the WinCC SCADA form. A SOC analyst will notice the suspicious activity thanks to MaxPatrol SIEM, a system for detecting information security incidents.
- TRACE MODE project spoofing. An intruder or an engineer with access to SCADA make configuration changes leading to an accident. Both legitimate users who violate the regulations and intruders who intentionally modify the project will be detected.
- Stopping PLCs and writing blocks. An engineer or an intruder with access to SCADA can stop a Siemens PLC and overwrite program blocks, which may lead to an accident. Such actions, regardless of who has committed them, suggest an intruder is present within the ICS network. A SOC analyst needs to investigate and identify the attack source. This is possible thanks to the PT ISIM deep process traffic analysis system and the MaxPatrol SIEM security incident detection system.
We look forward to welcoming all GITEX Global 2022 visitors on October 10–14 at our booth H2-B40 at Dubai World Trade Center.