(5411) 4372-4676 / 4372-4684 info@relational.com.ar

Complete Cyber Security and Visibility for ICS Environments

Visualize and Explore
Industrial Networks
Quickly Identify
and Address
Automatically Track
Industrial Assets and Know
Their Cyber Security Risks
Rapidly Detect Cyber
Threats/Risks and
Process Anomalies
Monitor ICS Risks
and Processes
Easily Integrate
with SOC/IT Tools
and Workflows

Guardian™ protects your control networks from cyberattacks and operational disruptions by providing complete ICS visibility and security in a single, unified solution.

Its advanced technology automatically maps and visualizes your entire industrial network, including assets, connections, and protocols. Guardian monitors network communications and behavior for risks that threaten the reliability of your systems, and provides the information you need to respond quickly.

Available as a passive monitoring solution, or a low-impact active solution with the Smart Polling™ add-on, Guardian allows you to choose the asset discovery approach that best fits your organization.

Guardian delivers:

  • Superior asset identification, network visualization and ICS risk monitoring
  • Real-time ICS threat, anomaly and vulnerability detection
  • Enterprise-class scalability when deployed with the Central Management Console™ (CMC)
  • Seamless integration with other security and IT tools

Find out how customers improve the reliability, cyber security and operational efficiency of their facilities with Guardian.

Superior Operational Visibility

  • Intuitive network visualization
  • Automated asset inventory
  • Real-time network monitoring

The Best ICS Threat Detection

  • Behavior-based anomaly detection
  • Rules and signature-based threat detection
  • Advanced correlation for detailed insights and rapid remediation
  • OT ThreatFeedsubscription ensures rapid detection of emerging risks

Extensive Global Installations

  • Multinational deployments with hundreds of facilities and thousands of devices
  • Monitors and reduces OT risks in sectors such as critical infrastructure, energy, manufacturing, mining, transportation and utilities

Time-Saving Forensic Tools

  • Dynamic Learningthat reduces false alerts
  • Automatic packet capture
  • TimeMachinesystem snapshots
  • Real-time ad hoc query tool

Superior ICS Network and Operational Visibility

Immediately Visualize Your Industrial Network


Real-time Network Visualization

  • Improves system awareness and understanding of network structure and activity
  • Displays key information such as traffic throughput, TCP connections, and the protocols used between nodes and zones
  • Speeds incident response and troubleshooting efforts

Flexible Navigation and Filtering

  • Shows macro views plus detailed information on endpoints and connections
  • Filters by subnets, network segments and topologies

Automatically Track Your Industrial Assets


Up-to-Date Asset Inventory

  • Advances cyber resiliency and saves time with automated asset inventory
  • Provides detailed and verified asset information
  • Identifies communicating assets using built-in passive network monitoring

Enhance Asset Tracking with Smart Polling Add-on Module

  • Discovers silent and rogue assets with active discovery
  • Includes firmware versions, patch levels and more

Continuously Monitor Your Network and ICS


Comprehensive Cyber Security and Reliability Monitoring

  • Improves network security and productivity through dashboards, charts and queries relevant to your organization
  • Monitors assets from all vendors and all network communications

Clear Presentation of Key Metrics

  • Displays summarized data related to alerts, incidents, vulnerabilities, etc.
  • Includes indicators of reliability issues such as unusual process values

Easy Access to ICS Data

  • Summarizes ICS risk information for selected date and time ranges
  • Supports drilldown on visual indicators for detailed information
  • Queries any aspect of your network or ICS

The Best ICS Threat Detection

Quickly Detect Threats to Your ICS or SCADA System


Up-to-the-Minute Threat Detection

  • Identifies cyber security and process reliability threats in real-time
  • Detects attacks in process, early stage advanced threats and cyber risks
  • Blocks attacks when integrated with compatible firewalls

Best-in-Class ICS Threat Detection

  • Uses anomaly and signature-based threat detection for comprehensive risk detection
  • Ensures current monitoring when integrated with OT ThreatFeed subscription

Rapidly Identify Your Vulnerability Risks


Automated Vulnerability Assessment

  • Identifies which vendors’ devices are vulnerable
  • Utilizes the U.S. government’s National Vulnerability Database (NVD) for standardized naming, description and scoring

Efficient Prioritization and Remediation

  • Speeds workflows with vulnerability dashboards and drilldowns
  • Addresses questions like “Do certain devices have vulnerable firmware?”

Reduce Troubleshooting and Forensic Efforts


Effective, Efficient Incident Response

  • Minimizes false positives with AI-powered Dynamic Learning
  • Decreases response time with Smart Incident™, which correlates alerts, provides operational context and delivers automatic packet captures

Informative Forensics

  • Decodes incidents with Time Machine™ system snapshots and diff reports (Snapshots are dynamic, allowing drilldown into rich ICS data.)
  • Provides answers fast with a powerful ad hoc query tool