US Region

Grandmetric LLC
Lewes DE 19958
16192 Coastal Hwy USA
EIN: 98-1615498
+1 302 691 94 10

EMEA Region

ul. Metalowa 5, 60-118 Poznań, Poland
NIP 7792433527
+48 61 271 04 43


Grandmetric LTD
Office 584b
182-184 High Street North
E6 2JA
+44 20 3321 5276

  • en
  • pl
  • Cyber Vision

    Full visibility of IT and OT cybersecurity systems

    Choose effective industrial network security and extend IT protection to IoT with Cisco Cyber Vision. Designed to ensure the highest level of network security and maximum operational efficiency, the Cisco solution is a proposition for manufacturing companies that expect reliable security of their critical operations and architecture.

    Protocols supported by Cisco Cyber Vision

    Cyber Vision supports protocols not only from the largest and most respected OT device suppliers, but also specialized industrial automation solutions.

    The solutions supported by Cyber Vision include products from Schneider Electric, Honeywell, Siemens, General Electric, Mitsubishi, Emerson, Rockwell Automation and many others.

    1. Some field network protocols supported by Cisco Cyber Vision: PCCC/DF1, EtherCACT, Codesys, ROC Plus, Fanuc, Fieldbus HSE, SLMP, CC-Link, RFTP, NTCIP, DSRC, MQTT (SCATS), RoadSensor, Ethernet/IP, S7, Profinet, CMP-LINK
    2. Some distributed control system protocols supported by Cyber Vision: DeltaV, Ovation, DCS, GE Mark VI, Experion, Triconex, PCS7
    3. SCADA solutions supported by Cyber Vision: ABB, Allen-Bradley, Alstom, B&R Automation, Beckhoff, Eaton, Emerson, Foxboro, General Electric, Honeywell, Mitsubishi, Omron, Phoenix Contact, Rockwell Automation, Schneider Electric, Siemens, Toyoda/JTEKT, Wago, Yokogawa
    4. Data collection protocols: OPC-DA, OPC-UA, OPC-EA, OSIsoft PI-Connect, PcVue Solution
    5. Some network protocols: ARP, BGP, CIFS, DCE-RPC, DHCP (v4 and v6), DNS, Dropbox, Ethernet, FTP, HTTP, HTTPS, ICMP (v4 and v6), IGMP, IKE, IMAP, IMAPS, LDAP, LDAPS, LLDP, mDNS, NetBIOS, NetBIOS-NS, NTP, OSPF, POP3, PTP, RDP, RPC, RTP, RTSP, SMB, SMB Browser, SMTP, SNMP, SQL Server, SSH, Syslog, TCP/IP (v4 and v6), Telnet, TFTP, VNC, WebDAV
    6. Redundancy and ring protocols: DLR, HSR, MRP, PRP, STP, VRRP
    7. Other network protocols: Cisco Discovery Protocol (CDP), HP Switch Protocol (HPSW), Foundry Discovery Protocol (Ruckus FDP), MikroTik Neighbor Discovery Protocol (MNDP)
    autoryzowany partner schneider electric authorized partner

    What makes Cyber Vision unique?

    The proposed solution ensures full visibility of cybersecurity systems, enabling the construction of an efficient network infrastructure, which is a condition for the uninterrupted operation of industrial companies. Discover all the most important advantages of implementing Cisco Cyber Vision and choose security solutions tailored to your business.

    Complete overview of the industrial network

    Thanks to the Cyber Vision system, you will identify all your industrial assets to see how communication between them takes place. Simple implementation makes it a solution recommended for both medium and large organizations.

    Higher operational efficiency

    By using a configuration tailored to your needs, you will gain valuable support for seamless communication, reducing downtime and increasing network efficiency. You can monitor events, identify communication issues, and resolve issues faster.

    IT security extended to IoT

    The solution from Cisco constantly monitors elements of the industrial network, with particular emphasis on IoT security. Thanks to communication with security devices, you can easily manage risk and enforce security rules throughout the network.

    Lower risk of OT attacks

    Check which cybersecurity tasks should be prioritized to reduce the likelihood of an attack. By understanding the status of OT security, you will easily identify devices that require immediate attention, and the system will offer you optimal solutions.

    cyber visioin sensory

    How does Cyber Vision implement the Zero Trust policy in industrial networks?


    We can see what is happening in the network, e.g. using sensors embedded in Industrial Ethernet devices. Their task is to report what they see to a central system, e.g. Cisco Cyber Vision. Thanks to this, we are able to see the relationships between individual devices and the communication that exists between them. In the next step, we can use this to introduce proper device isolation or network segmentation.

    Endpoint Visibility


    This element has two main distinguishing features. The first is Common Vulnerabilities and Exposure (CVE). This is a classification and description of known threats associated with a specific device or its firmware. The second distinguishing feature is the Risk Score, a parameter determining the level of risk in relation to the connecting device.

    Endpoint Compliance


    This is the isolation of individual parts of the network and then the definition of allowed communication between individual segments. Most often, a segment is a group of devices that naturally communicate with each other. Segmentation naturally isolates devices in individual zones that do not need to communicate with each other. Thus, it reduces, for example, the likelihood of an attack spreading to the entire network if one of the segments is compromised.

    Network Segmentation

    Detection and Threat Response

    The fact that we know what is happening in our network and that we only connect devices that comply with our policy does not guarantee that we will avoid an attack on our network.

    Cyber Vision allows you to detect threats and then guide or help eliminate them. By detecting suspicious behaviour on the network, Cyber Vision can react and, for example, disconnect the device from the network.

    Threat Detection and Response

    Who is Cisco Cyber Vision for?

    Deep integration between IT systems, cloud solutions and devices operating in the industrial network increases the risk of threats in manufacturing enterprises. Companies focusing on full digitization and implementing IoT (Industrial Internet of Things) solutions need multi-dimensional security measures that allow monitoring security, ensure the continuity of industrial operations and increase resistance to attacks.

    Using Cisco Cyber Vision, you can:

    We have firewalls, but little visibility into what’s behind them. Cyber Vision shows us
    exactly what devices are connected, how much traffic they generate, what profiles they have and who has remote access to them.

    Pascal Pauwels, Infrastructure Director, Unilin Group

    Our OT team didn’t understand the nuances of cybersecurity, and we in IT didn’t know the technologies they used every day. Cisco Cyber Vision gave us insight into exactly what devices we have and what they do.

    Kristen Sanders, CISO, Albuquerque Bernalillo County Water Utility Authority

    Check how Cyber Vision will help increase the security of the industrial network in your organization.

    Talk to our experts!

      Get in touch

      You hereby agree that Grandmetric can call you to process the given request. You also agree to obtain marketing information such as our newsletter. More about how we collect and process personal data in Privacy Policy.

      Sales Team Grandmetric