Cisco Cyber Vision
Gain visibility on industrial networks, understand your OT security posture, improve operations efficiency, and extend IT security to OT


Actionable insights to secure your industrial networks


Gain visibility on your industrial IoT and ICS, so your IT and OT teams can work together to boost OT security, maintain uptime, and improve operational efficiency.



Cisco Cyber Vision enables organizations to ensure the continuity, resilience, and safety of their industrial operations by providing continuous visibility into their Industrial Control Systems (ICS) to understand their security posture, improve their industrial networks efficiency, and extend IT security to their industrial operations.


You can't secure what you can't see

Cisco Cyber Vision gives you an in-depth view of your operational technology (OT) security posture-and it couldn't be easier to deploy at scale.

Know what's in your industrial network

Identify all your industrial assets and see how they're communicating. Cyber Vision builds visibility into your network infrastructure, so deployment is simple, even at massive scale.

Shrink your OT attack surface

Know what actions to prioritize by understanding your OT security posture. Cyber Vision spotlights devices that need immediate attention and suggests solutions.

Boost operational efficiency

Reduce downtime and improve your network's performance by monitoring OT events, identifying communication problems, and troubleshooting issues faster.

Extend IT security to OT

Cyber Vision feeds your IT security tools with information on OT assets and events, making it easier to manage risks and enforce security policies throughout your network.

Discover how OT visibility helps to secure operations.

Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety.


Cyber Vision now also available in Cisco loT Operations Dashboard

Gain visibility into distributed operations with the extended reach of a cloud-based solution. Connect, maintain, and secure industrial assets with Cisco loT Operations Dashboard.


OT visibility meets the power of IT security

Prevent attacks from spreading

Enforce ISA99/IEC62443-3-3 zones and conduits with dynamic network segmentation, using Cyber Vision with Cisco ISE.

Unify OT and IT security

Bring IT/OT investigation and remediation together by adding your OT to your SIEM, SOAR, and XDR platforms.

Get OT context in your IT apps

Extend Cyber Vision's OT intelligence to your IT applications, with out-of-the-box integrations and a rich API.


If you've got a Cisco Enterprise Agreement, it's easy to get Cisco Cyber Vision

Your Cisco Enterprise Agreement just got even better. Include Cisco Cyber Vision to protect and optimize your industrial operations, just as you do your data.



Overview:

The deeper integration between IT, cloud, and industrial networks is exposing your Industrial Control Systems (ICS) to cyber threats. As you begin to capture the benefits of your industry digitization efforts and start deploying Industrial Internet of Things (IIoT) technologies, you need a cybersecurity solution to help you ensure the continuity, resilience, and safety of your industrial operations.

Cisco Cyber Vision has been specifically designed for industrial organizations to gain full visibility into their industrial networks, providing precise information on their OT security posture so they can build secure infrastructures, drive regulatory compliance, and enforce security policies to control risks.

Cisco Cyber Vision combines a unique edge monitoring architecture and deep integration with Cisco’s leading security portfolio. Built into your Cisco industrial network equipment, it can be easily deployed at scale to monitor your industrial assets and their application flows in real time. It is the ideal solution to feed your IT Security Operations Center (SOC) with OT context, so you can build a unified IT/OT cybersecurity architecture.

Security built into your industrial network

Cisco Cyber Vision’s unique edge computing architecture embeds security monitoring components within our industrial network equipment. There’s no need to source dedicated appliances and think about how to install them. There’s no need to build an out-of-band network to send industrial network flows to a central security platform. Cyber Vision enables the industrial network to collect the information required to provide comprehensive visibility, analytics, and threat detection. Network managers will appreciate the unique simplicity and lower costs of the Cyber Vision architecture for deploying OT security at scale.


Cyber Vision’s network sensors provide the flexibility for gaining visibility at scale without impacting network performance

Comprehensive visibility

Cyber Vision leverages passive and active discovery mechanisms to identify all your assets, their characteristics, and their communications. Active discovery queries are extremely precise and nondisruptive. They use the semantic of the protocols at play to gather details on all your industrial assets, including Windows-based systems. Because queries are initated from Cyber Vision sensors embedded in Cisco network equipment forming the industrial network, they are not blocked by firewalls or NAT boundaries, resulting in comprehensive visibility.

This wealth of information on assets, communication maps, and operational and security events can be access by local OT and IT team members. It can also be aggregated in a Cyber Vision Global Center, for large organizations to gain global visibility across all sites and drive governance and compliance


Cyber Vision leverages a nonintrusive edge architecture to offer detailed information to local and global stakeholders

Security posture

Cisco Cyber Vision combines protocol analysis, intrusion detection, vulnerability detection and behavioral analysis to help you understand your security posture. It automatically calculates risk scores for each component, device and any specific parts of your operations to highlight critical issues so you can prioritize what needs to be fixed. Each score comes with guidance on how to reduce your exposure so you can be proactive and build an improvement process to address risks.

Cyber Vision’s detection engine leverages threat intelligence from Cisco Talos, one of the world’s leading cybersecurity research team and the official developer of Snort signature files. The Cyber Vision threat knowledge base is updated every week to include the latest list of asset vulnerabilities and IDS signatures.

Operational insights

Cisco Cyber Vision automatically uncovers the smallest details of the production infrastructure: vendor references, firmware and hardware versions, serial numbers, rack slot configuration, etc. It identifies asset relationships, communication patterns, and more. Information is shown in various types of maps, tables, and reports.

Cisco Cyber Vision gives OT engineers real-time insight into the actual status of industrial processes, such as unexpected variable changes or controller modifications, so they can quickly troubleshoot production issues and maintain uptime. Cyber experts can easily dive into all this data to investigate security events. Chief information security officers have all the necessary information to document incident reports and drive regulatory compliance.

The product uses tags to highlight asset roles and communication contexts, so that any OT and IT team member can easily understand the industrial infrastructure and operational events, regardless of the asset brand or references. IT teams can then work with OT staff to drive best practices such as patching vulnerable assets, tracking default password uses, improving network segmentation, and more.


Gain operational insights into your assets, industrial processes, communication flows and your security posture

IT security integrations

Cyber Vision’s detailed asset inventory and visibility into OT events provide value to both operations and IT security teams. Out-of-the-box integrations with Cisco’s security portfolio, as well as with a broad set of third-party solutions, extend Cyber Vision’s insight to risk and compliance monitoring and reporting, security policy enforcement, and much more. It extends the IT SOC to the OT domain.

Cyber Vision integrates seamlessly with leading SIEM systems such as IBM QRadar or SPLUNK so security analysts can trace industrial events in their existing tools and start correlating OT/IT events. Leveraging Cyber Vision’s rich API, IT and OT teams can feed any existing tool with deep knowledge on industrial assets, network traffic, and security posture.


Cyber Vision extends your IT security operations to OT by feeding your existing tools with context on industrial assets and events

Cisco SecureX

Are you seeing an abnormal behavior in Cisco Cyber Vision? Just click the “Investigate in SecureX” button to pivot to Cisco SecureX™ and run a deeper investigation on any observables (IP and MAC addresses, usernames, hostnames, URLs, and more). SecureX leverages intelligence from Cisco Secure Endpoint, Secure Network Analytics, Secure Firewall, Umbrella, and more, to give you a complete view of threats and activities across your IT and OT networks. And if you are not familiar with threat investigation, you can promote to SecureX an event detected by Cyber Vision for an analyst to investigate and launch remediation via specific playbooks and custom workflows. The SecureX ribbon always available on the Cyber Vision user interface makes it even easier to create a case and launch investigations.

Cisco Identity Services Engine (ISE)

Extend software-based network segmentation policies to your industrial control network and start enforcing zero trust security. Cyber Vision shares discovered host, protocol, communications patterns, and more with Cisco ISE through pxGrid to extend ISE’s awareness and policy enforcement into the control network. Cisco ISE can also leverage asset groups created by control engineers in Cyber Vision to automatically build secure zones and drive dynamic micro-segmentation of the industrial network. Just move an asset to another group in Cyber Vision to have ISE automatically apply the corresponding security policy to this asset.

Cisco Secure Network Analytics (Stealthwatch)

Extend behavioral analytics by looking at telemetry from your network infrastructure. Cisco Secure Network Analytics uses Cyber Vision insights to add context to the network flows it monitors and speed up incident response and forensics by pinpointing ICS assets on alarms.

Cisco Secure Firewall (Firepower)

Network segmentation is a key pillar to securing your network and protecting critical processes. Cyber Vision enriches host information in Cisco Secure Firewall to provide additional context in firewall policies. This context gives you laser-focused control of your network segmentation, as well as the ability to terminate unsanctioned sessions.

REST API

Cyber Vision exposes functionality and data access through a REST API. This allows for custom integration of third-party and homegrown applications for compliance and risk reporting, system and event monitoring and dashboards, and more. The built-in API Explorer offers a friendly user interface to build your own API calls, test them, and generate code easily. Out-of-the-box integrations are available such as with ServiceNow OT Management.

Common Event Format (CEF)

Cyber Vision discovery and event data may be output in Common Event Format (CEF) syslog for consumption by any number of third-party applications such as Configuration Management Databases (CMDBs), SIEM solutions, Security Orchestration, Automation, and Response (SOAR) platforms, and more. Free add-ons are available for easy integration with IBM QRadar and Splunk OT.

Features and Benefits:

Table lays out the key features of the Cisco Secure Workload workload protection features and their benefits.

Feature Benefit

Unique edge architecture

Easily deploy IoT/OT security at scale. Cyber Vision sensors are embedded in select Cisco networking equipment so you don’t have to deploy dedicated appliances or build an out-of-band SPAN collection network. Cyber Vision can also monitor industrial networks built with third-party equipment.
No network overload No need for additional network resources. Cyber Vision sensors decode industrial network traffic at the edge and only send lightweight metadata to the Cyber Vision Center. This unique architecture only adds 2% to 5% load to your industrial network.
Global view on all your sites Drive governance and compliance with detailed security information on all your industrial sites. The Cyber Vision Global Center seamlessly aggregates data from all local centers so that CISO and security teams have centralized visibility into assets and events per site and across sites.
Passive and active discovery Cyber Vision monitors your industrial operations by passively capturing and decoding network traffic using Deep Packet Inspection (DPI) of industrial control protocols. More information can be collected with active discovery that sends extremely precise and nondisruptive requests in the semantics of the specific ICS protocol at play.
100% visibility Only Cyber Vision’s distributed edge active discovery can give you 100% visibility into your industrial network. It sends targeted inquiries to assets from sensors embedded in network equipment, so these messages are not blocked by firewalls or Network Address Translation (NAT) boundaries, resulting in 100% visibility.
Dynamic asset inventory Build appropriate security policies and increase operational efficiency. Cyber Vision gives you real-time, detailed visibility into your industrial assets, their communication patterns, and application flows.
Risk scoring Focus on immediate threats and prioritize actions to quickly improve your security posture. Cyber Vision calculates risks for each device, as well as for specific site, line or any dataset. It even provides guidance on what can be done to proactively reduce risks.
Map views Visualize the activity of your control network. Cyber Vision offers several types of maps to show your assets and their communications. Quickly spot threats and anomalies, thanks to color coding.
Document zones and conduits Easily build security policies. Cyber Vision lets you group assets into zones (production cells, buildings, substations, etc.) so operation teams can share logical network information with IT and build security policies according to IEC 62443.
Operational insights Reduce downtime and improve network efficiency. Cyber Vision monitors all OT events to spot device problems before they disrupt production and help operations troubleshoot issues faster. It identifies problematic network patterns so IT can optimize configurations and network performance.
OT tags Immediately understand the role of each device and what it is doing. Cyber Vision translates application flows into human-readable tags, so you know what is going on, even if you’re not a protocol expert.
Preset views Easily dive into your dataset by using preset and custom views that highlight what really matters to you, helping you focus your detection strategy and share targeted information with colleagues.
Security insights Quickly understand your current security status, identify anomalies and vulnerabilities, and respond to threats. Cyber Vision offers various dashboards, reports, and event histories to easily spot security issues and share information with all stakeholders.
OT flight recorder Meet compliance requirements. Cyber Vision maintains the history of all events and application flows, including variable accesses, so you can easily run forensic searches and build incident reports.
Vulnerability detection Keep your industrial assets safe. Cyber Vision alerts you to hardware and software vulnerabilities that need to be patched.
Intrusion detection (IDS) Uncover the cybersecurity threats coming from your IT network. Cyber Vision integrates the Snort IDS engine leveraging Talos® subscription rules to detect known and emerging threats such as malware or malicious traffic.
Anomaly detection Detect deviations from what normal process behaviors should be. Easily create multiple baselines to profile your industrial operations or focus on what is most critical to you (such as a particular asset or specific behaviors such as remote access). Deviations immediately trigger alerts.
Correlate IT/OT security events Enhance your security event management practice. Cyber Vision is pre-integrated with leading SIEM and SOAR platforms such as IBM QRadar or SPLUNK, and can forward OT events and alerts to any other tool using Syslog. To avoid event fatigue, it even lets you choose which event types should be shared.
IT/OT collaboration Leverage OT knowledge of industrial assets and processes. Cyber Vision helps build a collaborative workflow between IT and OT to efficiently secure production. OT can report security events by providing additional context. IT can add custom properties to OT assets and groups to document specificities, dependencies, and stakeholders.
Extend IT security to OT Build a unified OT/IT SOC. Cyber Vision is fully integrated with Cisco IT security platforms (and others) and feeds them with rich details on OT assets and events. Creating OT security policies and remediating threats using existing IT tools is now much easier.
Rich integration with IT Easily share OT context with your IT tools. Cyber Vision comes preintegrated with many third-party solutions such as firewalls or ServiceNow’s OT Management, and has a rich REST API to build your custom integration. The API Explorer helps you write and test API calls via a friendly user interface and comes with code samples to get you started.
On-premise or in the Cloud Deploy where and how you prefer. On premise using a hardware or a virtual appliance, or in the cloud. Cyber Vision can be installed on Amazon Web Services or Microsoft Azure.
Information assurance and compliance Protect your organization’s data and comply with information security standards using Cyber Vision in FIPS 140-2 mode.

Platform Support:

Cisco Cyber Vision is built on a unique edge architecture consisting of multiple sensor devices that perform deep packet inspection, protocol analysis, and intrusion detection within your industrial network and an aggregation platform known as Cyber Vision Center. Cyber Vision Center stores data coming from the sensors and provides the user interface, analytics, behavioral analysis, reporting, API, and more. It may be run on a hardware appliance or as a virtual machine. The sensors are supported on the platforms listed in the table below.

Product components Platforms supported
Hardware sensor appliance Cisco IC3000 Industrial Compute Gateway (IC3000-2C2F-K9)
Network sensor Cisco Catalyst IE3300 Rugged Series switch
Cisco Catalyst IE3400 Rugged Series switch
Cisco Catalyst IE3400 Heavy Duty Series switch
Cisco Catalyst IE9300 Rugged Series switch (Coming Soon)
Cisco Catalyst IR1100 Rugged Series Routers
Cisco Catalyst IR8300 Rugged Series Router
Cisco Catalyst 9300 Series switch
Cisco Catalyst 9400 Series switch
Rockwell Stratix 5800 switch
Center hardware appliance Cisco UCS C220 M5 Rack Server
(CV-CNTR-M5S5 or CV-CNTR-M5S3 configurations)
Center software appliance VMware ESXi software appliance
Microsoft Hyper-V software appliance
Amazon AWS software appliance
Microsoft Azure software appliance

Cyber Vision Center hardware appliance specifications

Item CV-CNTR-M5S5 CV-CNTR-M5S3
Form factor 1RU Cisco UCS C220 M5 Rack Server
Processors Intel Xeon 2.3 GHz with 16 cores Intel Xeon 2.4 GHz with 10 cores
Memory Four 16-GB DDR4-2933-MHz RDIMM/1Rx4/1.2v Two 16-GB DDR4-2933-MHz RDIMM/1Rx4/1.2v
RAID

Cisco 12G modular RAID controller with 2-GB cache
RAID-1 and RAID-10 options

Internal storage Four 800-GB 2.5-in. enterprise performance 12G SAS SSD (3X endurance) Four 400-GB 2.5-in. enterprise performance 6G SAS SSD (3X endurance)
Embedded Network Interface Cards (NICs)

Dual 10GBASE-T Intel x550 Ethernet ports

Power supplies

Redundant Cisco UCS 1050W AC Power Supply for Rack Server

Management

Cisco Intersight
Cisco Integrated Management Controller (IMC)
Cisco IMC Supervisor
Cisco UCS Manager
Cisco UCS Central Software
Cisco UCS Director
Cisco UCS Performance Manager

Rack options

Cisco ball-bearing rail kit or friction rail kit with optional reversible cable management arm

Cyber Vision Center hardware appliance performance

Cisco Cyber Vision Center (Standalone/Local) hardware appliance scale
Item CV-CNTR-M5S5 CV-CNTR-M5S3
Max components 50,000 25,000
Max number of sensors 150 75
Max number of flows stored 8 million 4 million
Cisco Cyber Vision Global Center scale
Item CV-CNTR-M5S5 CV-CNTR-M5S3
Max components synced 150,000 75,000
Max number of registered centers 20 20

Cyber Vision Center virtual appliance specifications

Characteristic Private Cloud Public Cloud
Minimum specifications* for the Cyber Vision Center virtual appliance
CPU Intel Xeon, 10 cores Intel Xeon, 10 cores
Memory 32 GB minimum 32 GB minimum
Storage 1 TB SSD minimum 1 TB SSD minimum
Virtualization software VMware ESXi 6.x or later
Microsoft Hyper-V on Windows Server 2016 or later
Amazon Web Services
Microsoft Azure

* These VM requirements support monitoring of up to 10000 endpoints.

Licensing:

Cisco Cyber Vision is licensed using a recurring subscription model based on the number of endpoints monitored and is available in 1-, 3-, 5-, and 7-year terms. Licensing is available in two tiers-Essentials and Advantage-that provide different levels of capabilities to meet your particular requirements. The product uses Cisco Smart Licensing with the option for Specific License Reservation (SLR) licenses for air-gapped networks.

Licensing levels
Essentials Advantage

Inventory

  • Device inventory
  • Identify communication patterns
  • Generate inventory reports

Vulnerability

  • Identify device vulnerabilities
  • Generate vulnerability reports

Activities

  • Track control system events
  • Generate device activity reports

Restful API

  • REST API programming interface
Includes Essentials features, plus:

Security Posture

  • Device Risk Scoring

Intrusion Detection (IDS)

  • Snort IDS on supported sensors
  • Talos community signatures (New rules may be added 30 days after release)

Behavior Monitoring

  • User-created baselines for asset behaviors
  • Alerts on deviations

Advanced integration

  • SecureX Ribbon
  • pxGrid integration with ISE
  • Firepower Host Attribute integration
  • SIEM Integration - Splunk, IBM QRadar
  • ServiceNow OT Management integration (Coming soon)
Talos subscriber rules option for Cyber Vision IDS
(Requires Cyber Vision Advantage; licensed per IDS sensor deployed)

  • Talos subscription signatures, specifically curated for industrial networks
  • Immediate rules availability
  • 15x more rules compared to community signatures

Endpoint license packs are available for 25, 100, 250, 500, 750, 1000, 2500, 5000, 7500, and 10,000 endpoints. IDS is available on the Cyber Vision Center as well as on the Cisco IC3000 hardware sensor, the Catalyst IR8300 Rugged router and the Catalyst 9300 or 9400 switches.

Documentation:

Download the Cisco Cyber Vision Datasheet (.PDF)

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.


נשמח לענות ולסייע בכל שאלה!

צרו איתנו קשר עוד היום להצעות מחיר משתלמות במיוחד