CECA evaluations confirm runZero's active scanning enhances ICS visibility without performance impact on SCADA

The National Renewable Energy Laboratory (NREL)'s Clean Energy Cybersecurity Accelerator™ (CECA) program performed an evaluation of the runZero Platform that accurately identified and inventoried all OT and IT IP-addressable assets through proprietary active scanning and passive traffic sampling in the test environment.

The CECA evaluations confirmed the ability of runZero’s active scanning methods to improve visibility with no impact on the performance of the Industry Control Systems (ICS) or ongoing supervisory control and data acquisition (SCADA) processes and communications.

View the Report

The most complete asset discovery and detailed fingerprinting available for OT/ICS environments

Gaining comprehensive visibility of all OT/ICS assets linked to critical infrastructure environments, encompassing both physical and virtual connections, is crucial for safeguarding systems from advanced cyber threats.

Watch an insightful discussion on asset identification, attack surface enumeration, and configuration management of OT/ICS devices through the lens of the new, groundbreaking research report from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program.

In this conversation they explore:

  • CECA’s role in revolutionizing cybersecurity research to protect OT/ICS assets.

  • Notable challenges for securing critical infrastructure environments.

  • The evolution of OT/ICS security, where it stands now, and where it needs to go.

  • CECA’s evaluation criteria and key results for testing the runZero platform.

Active Scanning with Fragile OT and IoT Devices

See how runZero does it

The runZero Platform is designed to improve an asset owner’s visibility into their environment without impeding system operations. CECA’s conclusions challenge the broadly held industry concern that active scanning can inherently disrupt operations. Active scanning in the CECA test environment with runZero, however, proved safe; opening the door to expand scanning beyond passive collection methods.

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2024 runZero, Inc. All Rights Reserved