ICS Intrusion Detection Design

Just like IT networks, ICS networks should be monitored for suspicious or potentially malicious events. Minor security issues may go undetected and become critical security incidents if an organization does not have the means to detect suspicious events. Unfortunately, most commercial intrusion detection (IDS) and security incident and event monitoring (SIEM) solutions are not appropriate for the ICS environment.

aeSolutions can help design and implement intrusion detection solutions that make sense for the ICS environment.