Summary is AI-generated, newsdesk-reviewed
  • Corsha-Dragos integration offers enhanced machine identity and threat detection for OT cybersecurity.
  • Achieving Zero Trust in OT by continuously verifying machine communications and identities.
  • Integrating Corsha's machine identity with Dragos's threat detection strengthens operational resilience.

Corsha, an innovator in Machine Identity Provider (mIDP) technology for machine-to-machine (M2M) communications, has announced a strategic partnership with Dragos, Inc., a renowned name in operational technology (OT) cybersecurity.

This collaboration aims to enhance security protocols in industrial systems by amalgamating machine identity and threat detection, thus providing a comprehensive and trusted basis for Zero Trust implementation in OT environments.

Addressing unverified machine traffic

With the rising complexity and connectivity of operational networks, security risks are mounting. The addition of new machines, sensors, and autonomous systems to production settings broadens the potential attack surface.

Often, these devices engage in communication without sufficient authentication, leaving room for exploitation. Adversaries are increasingly adept at using unverified machine traffic to bypass security measures and propagate threats unnoticed.

Corsha's automated machine identity solution

Achieving Zero Trust within OT settings transcends mere network visibility or perimeter defence

Achieving Zero Trust within OT settings transcends mere network visibility or perimeter defence; it necessitates constant verification of all machines and actions.

By integrating Corsha's automated machine identity and continuous authentication system with Dragos' robust threat intelligence, organisations can verify every machine communication's identity and ensure threats are swiftly identified and mitigated, preventing operational disruptions.

Dragos’ comprehensive threat detection

Anusha Iyer, CEO and Founder of Corsha, emphasised that machine-to-machine communication is critical yet poorly protected within modern operational systems.

"By integrating our machine identity platform with Dragos’ threat detection platform, we are enabling organisations to verify connections continuously and act on real-time identity-driven intelligence. This partnership realises Zero Trust for OT, enhancing resilience and response capabilities and securing critical industrial systems," she stated.

Enhancing OT security with integrated solutions

The joint integration of Corsha’s machine identity platform with the Dragos Platform assigns customers

Dan Dorchinsky, VP Public Sector at Dragos Inc., remarked on the necessity of combining visibility and confidence in machine connections for securing OT environments.

The joint integration of Corsha’s machine identity platform with the Dragos Platform empowers customers with actionable insights, fostering rapid and confident responses. By fusing Corsha’s identity verification with Dragos’s comprehensive threat detection and visibility capabilities, organisations can bolster their defense measures and fortify operational resilience.

Layered OT defence strategies

The Corsha and Dragos integration connects two vital OT defense components: continuous machine identity assurance and advanced threat detection. This direct integration offers enhanced visibility, trust, and control over operational ecosystems.

Dragos provides intricate visibility across ICS/OT networks to identify anomalies, while Corsha ensures only authenticated machines establish or uphold connections, mitigating risks of unauthorised activity.

Strengthening Zero Trust through real-time controls

Collaboration has wider Zero Trust coverage by merging Dragos’ real-time asset with Corsha’s identity

This collaboration delivers broader Zero Trust coverage by merging Dragos’ real-time asset visibility with Corsha’s dynamic identity management, facilitating policy-based segmentation and access controls.

It enhances security by not just detecting threats but actively enforcing secure communications standards, specifically in non-human interactions.

Optimising incident response and control measures

With machine identity context added to Dragos’ precise detections, Corsha amplifies the accuracy of trusted communication intelligence, streamlining response efforts.

This provides security teams with clearer, actionable insights that expedite threat investigation and resolution across OT settings.

Progressing SANS Five ICS Critical Controls

Corsha mIDP introduces machine identity and access control measures that align with the SANS Five ICS

The Corsha mIDP, through integration with Dragos, introduces machine identity and access control measures that align with the SANS Five ICS Critical Controls.

By consistently verifying and authenticating machine communications, the joint solution enforces strong network boundaries and builds layered defences that comply with industry best practices.

Achieving Zero Trust by validating connections

Through this collaboration, Corsha and Dragos empower organisations to attain Zero Trust within OT environments by validating each connection, strengthening detections with machine identity, and dynamically regulating access based on risk levels.

These combined capabilities accelerate the identification and containment of malicious activities, ensuring uninterrupted operational safety in demanding industrial settings.

Understand how converged physical and cybersecurity systems can scale protection.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...