Professional Documents
Culture Documents
13 Conclusion
13 About Claroty Continuous Threat Detection (CTD)
13 About Claroty Secure Remote Access (SRA)
13 About Claroty
INTRODUCTION
What is the NIST Cybersecurity What is the purpose of this paper?
Framework?
The National Institute of Standards and Organizations seeking to comply with the NIST CSF
Technology (NIST) Cybersecurity Framework (CSF) have many variables to consider, including the
is a comprehensive set of guidelines designed to suitability of their technology stack. While the
help critical infrastructure owners and operators framework is technology-neutral, adhering to its
better manage and reduce cybersecurity risk. guidelines requires specific types of tools with
specific capabilities.
Created in response to Improving Critical
Infrastructure Cybersecurity, a 2013 U.S. federal Having long supported critical infrastructure owners
executive order, the framework is voluntary. and operators in their efforts to better manage and
Nonetheless, its flexibility, common lexicon, and reduce cybersecurity risk in their operational
emphasis on using business drivers to shape technology (OT) environments, the Claroty Platform is
cybersecurity initiatives have fueled the highly conducive to compliance with the vast majority
framework’s widespread appeal, adoption, and of these guidelines.
recognition as a true requirement across all
sectors and industries not only in the U.S., but also This paper details the extent that the Claroty
in numerous countries globally. Platform — which includes Claroty’s Continuous
Threat Detection (CTD) and Secure Remote Access
The NIST CSF has also since inspired and shaped a (SRA) products — maps to the guidelines set forth by
number of other regulatory frameworks and best- the five core functions, as well as all corresponding
practices that are widely adhered to and categories and subcategories, of version 1.1 of the
embraced worldwide. NIST Cybersecurity Framework.
ID
Subcategories
ID Category ID Category Description Claroty Support
with Claroty
Support
ID
Subcategories
ID Category ID Category Description Claroty Support
with Claroty
Support
PR
Subcategories
PR Category PR Category Description Claroty Support
with Claroty
Support
PR
Subcategories
PR Category PR Category Description Claroty Support
with Claroty
Support
Technical security solutions are CTD monitors for removable media use.
managed to ensure the security PR.PT-1;
PR.PT: CTD Risk and Vulnerability Management PR.PT-2;
and resilience of systems and
Protective identifies unnecessary capabilities on in- PR.PT-3;
assets, consistent with related
Technology scope systems that should be removed. PR.PT-4;
policies, procedures, and
agreements. PR.PT-5
CTD Policy Zones and network analysis
protects control networks directly, and
through instantiation of firewall policy.
DE
Subcategories
DE Category DE Category Description Claroty Support
with Claroty
Support
DE
Subcategories
DE Category DE Category Description Claroty Support
with Claroty
Support
RS
Subcategories
RS Category RS Category Description Claroty Support
with Claroty
Support
RS
Subcategories
RS Category RS Category Description Claroty Support
with Claroty
Support
RC
Subcategories
RC Category RC Category Description Claroty Support
with Claroty
Support
As the foundation of the Claroty Platform, Claroty Secure Remote Access (SRA) tackles one of
Continuous Threat Detection (CTD) grants the toughest challenges facing industrial cybersecurity
complete visibility into OT networks, seamless practitioners today: maintaining the ability to remotely
management of all OT assets, and continuous access OT environments while minimizing the
monitoring of all threats, vulnerabilities, and risks substantial risks introduced by remote users.
relevant to those assets and networks.
Part of the Claroty Platform, SRA enables customers to
Claroty's proprietary deep packet inspection safeguard their networks from threats posed by
technology enables CTD to extract precise details unmanaged and unmonitored OT remote access.
about each asset on the OT network, profile all
communications and protocols, generate a fine- It enforces least-privilege policies, enables real-time
grain behavioral baseline that characterizes monitoring and full recording of all remote sessions,
legitimate traffic, and alert you in real-time to and provides a single, secure, and clientless interface
baseline deviations, full-match vulnerabilities, and through which all internal and third-party users
known and zero-day threats. connect prior to performing support, audits, or related
activities within OT environments.
About Claroty
Claroty bridges the industrial cybersecurity gap between information technology (IT) and operational technology (OT)
environments. Organizations with highly automated production sites and factories that face significant security and financial
risk especially need to bridge this gap. Armed with Claroty’s converged IT/OT solutions, these enterprises and critical
infrastructure operators can leverage their existing IT security processes and technologies to improve the availability, safety,
and reliability of their OT assets and networks seamlessly and without requiring downtime or dedicated teams. The result is
more uptime and greater efficiency across business and production operations.
Backed and adopted by leading industrial automation vendors, Claroty is deployed on all seven continents globally. The
company is headquartered in New York City and has received $100 million in funding since being launched by the famed
Team8 foundry in 2015.