USSC
Services and Solutions
  • Managing IT Security
    • Managing IT Security
  • Security Services
    • Service programme
    • Supported solution
    • Advantages
  • OT Cybersecurity
    • OT Cybersecurity
  • Security Operations Center SOC
    • Security Operations Center SOC
  • Consulting
    • Consulting
  • Information Security Assessment
    • Information Security Assessment
  • Information Security Solutions
    • Security Information and Event Management
    • IAM, IDM, PAM deployment
  • Information Technology
    • Data transmission networks
    • IT infrastructure
    • Information services
    • Interaction services
    • Multimedia projects
Media Center
  • News
  • Success stories
Company
Contacts
More
    Ask a question
    Request a call
    info@ussc.ru
    11/3, Saraevskaya st., Belgrad, Serbia
    RU
    Request a call
    USSC
    Services and Solutions
    • Managing IT Security
    • Security Services
    • OT Cybersecurity
    • Security Operations Center SOC
    • Consulting
    • Information Security Assessment
    • Information Security Solutions
    • Information Technology
    Media Center
    • News
    • Success stories
    Company
    Contacts
      USSC
      Services and Solutions
      • Managing IT Security
      • Security Services
      • OT Cybersecurity
      • Security Operations Center SOC
      • Consulting
      • Information Security Assessment
      • Information Security Solutions
      • Information Technology
      Media Center
      • News
      • Success stories
      Company
      Contacts
        USSC
        USSC
        • Services and Solutions
          • Back to
          • Services and Solutions
          • Managing IT Security
            • Back to
            • Managing IT Security
            • Managing IT Security
          • Security Services
            • Back to
            • Security Services
            • Service programme
            • Supported solution
            • Advantages
          • OT Cybersecurity
            • Back to
            • OT Cybersecurity
            • OT Cybersecurity
          • Security Operations Center SOC
            • Back to
            • Security Operations Center SOC
            • Security Operations Center SOC
          • Consulting
            • Back to
            • Consulting
            • Consulting
          • Information Security Assessment
            • Back to
            • Information Security Assessment
            • Information Security Assessment
          • Information Security Solutions
            • Back to
            • Information Security Solutions
            • Security Information and Event Management
            • IAM, IDM, PAM deployment
          • Information Technology
            • Back to
            • Information Technology
            • Data transmission networks
            • IT infrastructure
            • Information services
            • Interaction services
            • Multimedia projects
        • Media Center
          • Back to
          • Media Center
          • News
          • Success stories
        • Company
        • Contacts
        info@ussc.ru
        11/3, Saraevskaya st., Belgrad, Serbia
        • Home page
        • Products and Services
        • DATAPK

        DATAPK

        Request a call
        Message us
        Your feedback
        Our offices
        DATAPK – Industrial Control System Security monitoring solution

        DATAPK is a specialized product, designed for critical infrastructure objects and critical IT infrastructure security status monitoring, incl. Industrial Control Systems (ICS).

        Due to the nature of many industrial processes resulting damage from an ICS security incident may impact human safety and natural environment.

        ICS security breach may result in severe technological consequences, such as:

        • accidents, resulting in human safety impacts, environmental impacts, and production equipment damage;
        • industrial and technological process disruption resulting in financial losses;
        • fraud and theft occurring via misuse of the ICS components.

        In order to detect security breach preconditions and prevent ICS-related incidents, USSC has developed an Industrial Security Monitoring System (ISMS) based on DATAPK – a specialized product, designed to provide real-time and retrospective ICS security status monitoring and analysis.

        DATAPK is based on internal R&D study results in ICS security, state-of-the-art modern technologies, and a deep practical expertise derived from numerous projects.

        datapk1.png

        DATAPK is designed to:

        • detect unsanctioned ICS changes and notify the operators;
        • discover unprotected ICS assets;
        • discover assets with critical vulnerabilities;
        • detect vulnerability exploitation attempts;
        • log security events and incidents;
        • automate compliance status control.

        DATAPK advantages:

        • requires no agent software installation on ICS assets;
        • minimum ICS network performance impact;
        • several deployment options including industrial appliance;
        • various operation modes for different ICS classes and asset types;
        • centralized and local management support;
        • external security management system integration;
        • hierarchical SIEM integration support.

        datapk2.png

        DATAPK functions:

        1. Secured assets catalogue: asset discovery and list change monitoring.
        2. Security events management: collection, normalization and correlation for ICS and security subsystem assets.
        3. Asset configuration management and anomaly detection.
        4. ICS vulnerability detection and compliance control for state and enterprise regulations and policies.

        DATAPK operation modes:

        • Passive monitoring

        • This mode utilizes unidirectional traffic flow and analysis, having zero impact on the secured ICS.
        • Active monitoring

        • Active monitoring requires bidirectional information exchange, such as event and configuration collection. Active monitoring relies on built-in ICS asset remote access protocols and does not generate additional load on the asset CPU and other resources.
        • Vulnerability scanning

        • Scanning requires active interaction between DATAPK and the secured assets in order to detect vulnerabilities and possible exploits. This mode is recommended for application during ICS maintenance only.

        Services and Solutions
        Managing IT Security
        Security Services
        OT Cybersecurity
        Security Operations Center SOC
        Consulting
        Information Security Assessment
        Information Security Solutions
        Information Technology
        Company
        Newsroom
        Contacts
        Subscribe to newsletter
        Request a call
        info@ussc.ru
        11/3, Saraevskaya st., Belgrad, Serbia
        Privacy policy
        © 2026 All rights reserved
        This site uses cookies essential to its operation, for analytics, and for personalized content. By continuing to browse this site, you acknowledge the use of cookies.