On-premises and/or cloud based downloadable industrial cybersecurity software for providing functionalities for managing and protecting industrial control systems (ICS) against cyber damage, including one or more, or any combination of the following: automatic learning of topology and operational behavior of an ICS, modelling ICS performance, providing visibility of ICS performance, monitoring ICS network communications, analysis of ICS network communications, deep packet inspection of ICS network communications, monitoring changes in ICS software and/or hardware, supervising changes in configurations of ICS hardware and/or software, managing maintenance of ICS hardware and/or software, continuous monitoring of cyber incursion risk, anomaly detection, cyber attack risk analysis, cyber breach and attack simulation, cyber attack risk mitigation, prioritizing ICS security expenditure
Electrical and Scientific ApparatusComputer environment security management and protection services in the field of cybersecurity; software as a service (SaaS) services featuring software for use in management and protection of industrial control systems (ICS) against cyber damage, including for providing one or more, or any combination of modeling services of ICS performance; providing non-downloadable computer software for the use in modelling ICS performance; monitoring and inspection of ICS performance and to detect breakdowns in ICS; monitoring services of ICS network communications; analysis services of ICS network communications; deep packet inspection services of ICS network communications; monitoring services of changes in ICS software and/or hardware; computer management services for supervising changes in configurations of ICS hardware and/or software; maintenance services and maintenance management services of ICS software; continuous monitoring of computer systems for detecting cyber incursions; anomaly detection services in ICS software; computer security services for risk assessment of computer networks for protection against cyber attack; computer security services for testing of computer networks for the protection against cyber breaches and attacks; computer security consultancy for mitigation of cyber attack risk; technology consultation in the field of cybersecurity
Computer and Scientific