Cybersecurity solution for industrial control systems (InteRSePT)
[ DEFENSE ]

InteRSePT
InteRSePT® reduces cyberattack risks for critical infrastructure and manufacturing facilities. As a cybersecurity solution, InteRSePT® detects and reacts to targeted cyberattacks on control systems, utilizing superior technology that greatly outperforms conventional methodologies, and offers advanced security measures with emphasis on system availability.

For more information :

Detects and responds to cyber incidents on control systems

Targeted cyberattacks on control signals are detected using Mitsubishi Heavy Industries' unique “behavior detection” technology, developed from extensive experience accumulated in its engineering of control systems for critical infrastructure and operational technology sites. Furthermore, InteRSePT® in collaboration with Nozomi Networks combines its strength with the power of Nozomi Networks Guardian™ to deliver higher visibility and detection by asset, communication, and protocol monitoring.

The Security Management System (SMS) can be applied without requiring modifications to target systems and monitors the systems without interruption or deterioration in performance.

InteRSePT® advantages

  • Protection even from advanced persistent threats that imitate the behavior of control systems
  • Monitoring of the behavior of devices, processes, and communications
  • Advanced behavior detection rules designed from characteristics and operations of the monitored system
  • Tailored technical support of detection rules from MHI Group
  • Safe, passive detection that does not affect the control system
  • Visualization and detailed monitoring of assets and network status
  • Detection of intrusions, unauthorized behavior, incidents, device failures, and other anonymous activities
  • Intuitive dashboard for improved visibility of operation status and alerts
  • Real-time interception of unauthorized control signals
    (Optional function with Real-time Network Monitoring System)

Key functions of InteRSePT®

Key functions of InteRSePT®

Basic system configuration

Basic system configuration

Functions

Behavior
detection

Collects and analyzes commands and sensor values in
the control network. Monitors device activity and detects
unusual behavior.

Examples of behavior detection
Asset
monitoring
Visualizes the devices connected to the network.
Unauthorized
device detection
Detects the connection of unauthorized devices.
Unauthorized
communication
detection
Detects unauthorized communication.
Attack detection Detects attack patterns (DoS, port scanning,
man-in-the-middle attacks, unauthorized operations, etc.).
Network
monitoring
Visualizes network communication status, protocols,
and other profiles.
Device
information
display
Presents information about network devices.
Alert list Issues warnings of detected anomalies and visualizes the
current response status.
Alert trend Displays a graph of sensor values related to alerts.
Alert analysis Gives analysis of alerts.
Monitored threats

Dashboard

With a dashboard that visualizes network topology, assets, communication status, alerts, and more, InteRSePT® gives you a clear picture of your monitoring status.

Dashboard Screen
Dashboard Screen: Graph

Stories of MHI Group Expertise