Cydome Protect
Core Products
- Continuous IT and OT mapping
- Asset real-time monitoring
- Real-time Network intrusion detection system (IDS)
- Isolation breach detection
- Continuous vulnerability scanning, prioritizing and risk management
- Endpoint Detect and Respond (EDR)
- Securing maritime-specific OT assets and communication protocols
- Automating and simplifying compliance with maritime cyber regulations and requirements
Cydome Protect provides holistic cyber protection, vulnerability scanning and risk management, specifically built to secure maritime-specific IT, OT and communication devices, protocols and operations. With advanced AI that analyzes data across protection layers, it uniquely provides centralized, context-aware security and risk management that is highly accurate while being very easy to use.
Cydome Protect is easy to deploy and can be installed on any vessel, offshore or onshore facility. The solution is completely agnostic to 3rd party vendors, including network equipment and communications service providers.
You can couple Cydome Protect with Cydome Managed Services for a fully managed cyber protection, completely removing your cyber operations overhead.
Key Product Features
Asset Inventory
- Detailed inventory of assets and the relationships between them.
- Identify and prioritize risks and vulnerabilities to develop effective mitigation strategies.
- Make more informed decisions, allocate resources more efficiently, and improve overall security and resilience.
- Enables security teams to maintain an accurate and up-to-date inventory of all hardware and software assets, including servers, workstations, applications, and other IT and OT resources.
Detects unusual activity related to physical and digital assets. Security teams are alerted to deviations from normal asset usage patterns.
Provides real-time insights into potential security incidents:
- Unauthorized access
- Port changes
- Disconnections
- Other behavioral changes
Real-Time Network Monitoring
- Continuously monitors the vessel’s network for signs of malicious activity or intrusions. It analyzes all internal and external passing traffic using deep packet inspection (DPI) and matching them against a built-in library of known attacks and policies, as well as anomaly detection using advanced AI algorithms.
- Ensures the security and integrity of the vessel’s network infrastructure including the conformity to the defined network segments.
- Monitoring isolated devices, such as Electronic Chart Display and Information Systems (ECDIS), to detect any isolation breach. Isolation breaks increase the risk of unauthorized or malicious users compromising sensitive systems and, ultimately, the entire ship.
- When a breach is detected, the onboard and/or onshore security team will receive an alert to take appropriate action.
Vulnerability Management
- Identifies potential weaknesses and attack vectors on vessels. Automatically scan for vulnerabilities in all onboard systems and generate detailed reports. This feature enables organizations to proactively detect potential security risks and improve their security posture.
- A centralized interface and single truth source that helps organizations proactively identify, assess, and mitigate potential cyber risks before they materialize.
Endpoint Protection – Endpoint Detect and Respond (EDR)
- Real-time endpoint monitoring and detection.
- Endpoint antivirus and host firewall.
- Remote asset management.
- Remote isolation.
Integrated Risk Management
- Integrated monitoring and risk management of all security layers.
- Integrated security insights.
- Custom policies.
Compliance Automation
- Facilitates and automates maritime cybersecurity compliance processes.
- Pre-built automation for maritime cybersecurity regulations and requirements such as IACS UR E26, TSMA, NIST, Maritime Cyber Baseline and others.
The benefits of Cydome’s Multi-Layered Protection
Cydome provides multiple layers of defense. Those work in unison and are tightly integrated to ensure your vessels and assets are fully protected from known and unknown threats using maritime AI for anomaly detection in real-time across layers:
360° risk management:
- Assess a vessel as a whole across layers rather than protect individual devices and networks in silo
- Convergence of protection for IT, OT, IoT and communication
- Context awareness: assesses risk impact between layers / sensors
- Automated risk assessment for each device, network, vessel / office and entire fleet or operation
- AI anomaly detection trained on maritime data
Integrating with existing tools
Product Deployment
Cydome Protect installation is fully automated and it can be deployed as a virtual machine, on a dedicated server or directly on select appliances such as Inmarsat, Speedcast Sigma, Marpoint etc.
Ongoing Service and Support
Cydome Protect operates with “zero touch” approach that does not require the crew onboard to perform maintenance activities. Product updates are provided seamlessly to ensure your cybersecurity remain effective and up-to-date, without impact to your ongoing operations.