Kaspersky Industrial CyberSecurity for Networks is designed to protect the infrastructure of industrial enterprises from information security threats and to ensure the continuity of technological processes. Kaspersky Industrial CyberSecurity for Networks analyzes industrial network traffic to detect deviations in the values of technological parameters, detect signs of network attacks, and monitor the operation and current state of devices in the network. The application is a part of Kaspersky Industrial CyberSecurity solution.
Kaspersky Industrial CyberSecurity for Nodes is a complex server and workstation security solution for IT threats in industrial control systems.
Kaspersky Endpoint Agent allows you to configure integration between Kaspersky Industrial CyberSecurity for Networks and Kaspersky Industrial CyberSecurity for Nodes. Kaspersky Endpoint Agent is installed on individual devices with Kaspersky Industrial CyberSecurity for Nodes installed. Data about events on the device, collected by Kaspersky Industrial CyberSecurity for Nodes, is sent to Kaspersky Industrial CyberSecurity for Networks server by means of Kaspersky Endpoint Agent. Integration between the applications enhances Kaspersky Industrial CyberSecurity for Networks capabilities to investigate and respond to threats in industrial networks.
You can configure integration between Kaspersky Endpoint Agent and Kaspersky Industrial CyberSecurity for Networks in Kaspersky Security Center Administration Console, in Kaspersky Security Center Web Console, or using the command line interface locally on the device.
For complete information about Kaspersky Industrial CyberSecurity for Networks, as well as for information on configuring integration with Kaspersky Endpoint Agent from the side of Kaspersky Industrial CyberSecurity for Networks, refer to Kaspersky Industrial CyberSecurity for Networks Help.
Within integration with Kaspersky Industrial CyberSecurity for Networks, Kaspersky Endpoint Agent provides only information about hosts, information about triggering of Anti-virus applications, and information about network communications. Response actions to detected threats, network Isolation, and IOC Scan are not available.
Page top