Radiflow develops trusted Industrial Cyber-Security Solutions for critical business operations. We offer a complete portfolio of game-changing solutions for ICS/SCADA networks that empowers users to maintain visibility and control of their OT networks, including an Intelligent Threat Detection tool that passively monitors the OT network for anomalies, as well as Secure Gateways that protect OT networks from any deviations from set access policies



Our Representatives

Rani Kehat

VP Business Development, Radiflow

VP Business Development

Radiflow

Tsur Segal

VP of Strategic Sales, Radiflow

VP of Strategic Sales

Radiflow

Industrial cyber security is one of the core features of transitioning to Industry 4.0.

The interconnectivity between the enterprise and its business partners and customers, the introduction of Industrial IoT devices and the dramatic increase in communication protocols (in the physical and application layers, smart logistics and production management, vertical integration between IT systems and OT networks and many other areas) all increase the complexity of the enterprise digital environment and its exposure to external and internal threats.

While many production facilities rely on a mix of DCS systems and supporting SCADA with PLCs for secondary systems, adequate protection requires a multi-prong approach to OT security: OT network visibility, identification of threats, real-time monitoring, OT-aware firewalls for zone segregation and risk management.

In addition, manufacturers need to prove compliance with various governing standards and regulations (e.g. IEC-62443).

Radiflow provides manufacturers with the tools to protect, visualize and safely maintain their systems:

  • A complete visual model of the OT network: assets, connections, protocols and vulnerabilities
  • CIA (Confidentiality, Integrity & Availability, as well as Safety) per-business process risk evaluation, using iRISK
  • MSSP/SOC ready with alert prioritization triage and multi-iSID system management solution
  • Attack vector and attacker capability analysis for alert prioritization and optimizing risk mitigation investment
  • Compliance enabler for IEC 62443 and other common standards and regulations
  • Strong vendor support and strategic partnerships with leading solution providers.