













This guide includes both selection criteria and strategies for choosing the correct Cybersecurity Anomaly and Breach Detection system and supplier.
The scope of the criteria covers key aspects of cybersecurity, with a focus on anomaly and breach detection for industrial applications. The industrial cybersecurity anomaly and breach detection solution market includes a broad range of solutions using a variety of approaches for monitoring and evaluating the integrity of industrial control systems. These products may be sold separately or included as features in an overall cybersecurity management solution.
ARC divides these solutions into two major categories: endpoint breach detection solutions that assess control system integrity by monitoring the status of individual endpoint devices; and, anomalous network message detection solutions that assess system integrity through the monitoring of communications within the control system. Each category is further divided according to the methodology used for monitoring and evaluation.
Selection of the right cybersecurity anomaly and breach detection solution is mission critical, particularly for manufacturers. The total solution has become complex, and functionality involves the combination of an expanded range of capabilities and specific technology requirements. While product functionality and support play major roles, suppliers have specific domain expertise, geographical presence, and knowledge of certain industry dynamics. These must all be evaluated in a supplier selection process.
ARC has been researching the cybersecurity market for many years and we understand the challenges that organizations have to overcome when you deploy cybersecurity solutions. We know where additional insight may be needed, and the features that an anomaly and breach detection solution needs to be a fit for this purpose. This includes:
This ARC Selection Guide will help you select the best available Cybersecurity Anomaly and Breach Detection solution to meet your needs now and in the future.
For more information on this technology guide or to discuss how we can help you, please contact us.