Summary is AI-generated, newsdesk-reviewed
  • Corsha's machine identity secures M2M communications, enhancing Zero Trust in OT environments.
  • Integration with Dragos offers real-time asset visibility and advanced threat detection.
  • Joint solution reduces unauthorized activity, strengthens defenses, and accelerates incident response.

Corsha, recognized as an innovator in securing machine-to-machine (M2M) communications, has announced a new collaboration with Dragos, Inc., a noted entity in operational technology (OT) cybersecurity.

The partnership aims to revolutionize security measures for industrial systems by merging machine identity verification and threat detection, providing security teams with full visibility, enhanced control, and a foundation for Zero Trust strategies in OT environments.

Addressing Unverified Machine Traffic

The rising complexity and connectivity of operational networks have elevated the need for secure systems. As new machines, sensors, and autonomous systems are deployed, they increase the attack surface while frequently communicating without proper authentication.

Cyber adversaries leverage these unseen communications, utilizing trusted but unverified traffic to maneuver undetected.

Implementing Zero Trust with Machine Identity

Achieving Zero Trust in OT settings requires ongoing verification beyond network visibility

Achieving Zero Trust in OT settings requires ongoing verification beyond network visibility or perimeter defenses.

By integrating Corsha's automated machine identity and continuous authentication with Dragos's industrial threat intelligence, organizations can confirm each machine's legitimacy in communication, ensuring threats are promptly detected and managed to minimize disruptions.

Enhanced Threat Detection with Dragos

"Machine-to-machine communication forms the core of modern operational frameworks, yet it remains substantially unprotected," stated Anusha Iyer, CEO and Founder of Corsha.

"Integrating our machine identity solutions with Dragos's threat detection tools allows organizations to validate every connection and leverage identity-driven intelligence instantly, enhancing Zero Trust and securing critical industrial links."

Deep Monitoring and Visibility

Dan Dorchinsky, VP Public Sector at Dragos Inc., commented, "Securing OT environments demands profound threat insight and confidence in machine connections. Integrating Corsha's machine identity platform with the Dragos Platform offers customers actionable data swiftly and confidently."

"Combining Corsha's solution with Dragos's comprehensive monitoring, risk management, and threat detection fortifies defenses and resilience."

Unified Defense Layers

The collaboration between Corsha and Dragos combines two critical aspects of OT defense

The collaboration between Corsha and Dragos combines two critical aspects of OT defense: continuous machine identity from Corsha and advanced threat detection from Dragos.

This integrated system enhances visibility, trust, and control across operational environments. It prevents unauthorized and high-risk machine communications by leveraging Dragos's network insights alongside Corsha's identity-driven segmentation.

Strengthening Zero Trust Practices

This joint solution promotes deeper Zero Trust coverage by merging Dragos's asset visibility and threat detection with Corsha's machine identity and policy-based access controls.

This approach enables organizations to enforce trusted communications actively, particularly crucial for non-human connections.

Advancing Incident Response

By integrating machine identity insights with Dragos's high-fidelity detections, Corsha improves intelligence around trusted communications, streamlining incident triage and response.

This setup provides more accurate and actionable information, facilitating quicker response times across OT environments.

Supporting Industry Standards

Corsha's mIDP aids in Defensible Architecture policies within the SANS Five ICS Critical Controls

Through the Dragos integration, Corsha's machine identity provider (mIDP) aids in fulfilling Defensible Architecture guidelines within the SANS Five ICS Critical Controls. 

The ongoing authentication of machine-to-machine interactions enforces strict network boundaries and layered defenses aligned with industry best practices.

Zero Trust Implementation for OT

Together, Corsha and Dragos empower organizations to achieve Zero Trust in OT settings by confirming every connection, enriching threat detections with machine-level identities, and controlling access based on risk.

This capability helps swiftly identify and contain malicious activities, ensuring safe, uninterrupted operations in demanding industrial environments.

Understand how converged physical and cybersecurity systems can scale protection.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...