Features
While we have specific product pages and case studies, sometimes you just need a complete list of features Dispel has to offer. You've come to the right place.
What's built in
Dispel is designed quite specifically against NIST 800-52, 800-82, NERC CIP, and IEC 62443. When possible, we've built for a high impact level (e.g., FIPS 199 High for 800-52).
Because control criteria for a security program are inherently intertwined, our product extends beyond the traditional corners of legacy access tools into a platform model for security.
Secure Remote Access
File transfer & storage
File transfer & storage
Over the shoulder monitoring
Over the shoulder monitoring
Quick shortcuts to assets
Quick shortcuts to assets
Time-based access & revocation
Time-based access & revocation
Clientless & end-to-end encrypted
Clientless & end-to-end encrypted
"Just in Time" request access forms
"Just in Time" request access forms
Session recording
Session recording
Privileged Access Management
Enforce unique logins
Enforce unique logins
Federated identity integrations/SSO
Federated identity integrations/SSO
Hybrid identity provisioning
Hybrid identity provisioning
Vendor self-onboarding
Vendor self-onboarding
Phishing protection
Phishing protection
Multi-factor authentication AAL2 & 3
Multi-factor authentication AAL2 & 3
Role-based access control
Role-based access control
Encryption & Network Segmentation
Physical & logical segmentation
Physical & logical segmentation
Moving target defense
Moving target defense
Post-quantum encryption
Post-quantum encryption
Distributed architecture
Distributed architecture
Protocol/session termination
Protocol/session termination
No single point of failure
No single point of failure
No switch dependency
No switch dependency
Virtual Desktop Workstations
Customizable edge workstations
Customizable edge workstations
Patched automatically, single tenant
Patched automatically, single tenant
RDP & in-browser
RDP & in-browser
Multi-monitor; horizontal & vertical
Multi-monitor; horizontal & vertical
Audio passthrough
Audio passthrough
DISA STIG hardened
DISA STIG hardened
Joint remote sessions
Joint remote sessions
Password Vaulting
IT/OT asset credential management
IT/OT asset credential management
Automatic session injection
Automatic session injection
Supports multiple protocols
Supports multiple protocols
Never share credentials with users
Never share credentials with users
Auto asset password rotation
Auto asset password rotation
Encrypted vault
Encrypted vault
Transparent to users
Transparent to users
Asset Management
IT/OT asset inventory
IT/OT asset inventory
Make, model, ports, protocols
Make, model, ports, protocols
Assigned to specific facilities
Assigned to specific facilities
Granular access controls
Granular access controls
Integrations with discovery tools
Integrations with discovery tools
North/south traffic isolation
North/south traffic isolation
File Transfer & Data Streaming
Bi- & unidirectional data streaming
Bi- & unidirectional data streaming
File transfer with malware scanning
File transfer with malware scanning
OT, IT, and cloud connections
OT, IT, and cloud connections
Stepped Purdue level access
Stepped Purdue level access
Multiple geographic failovers
Multiple geographic failovers
Disaster Recovery/Business Continuity
Disaster Recovery/Business Continuity
Audit Logging & Recording
Full video recording
Full video recording
Network activity logs
Network activity logs
Immutable app & event logging
Immutable app & event logging
Keystroke logging
Keystroke logging
Recorded to client-site
Recorded to client-site
Meets U.S. Federal evidence regulations
Meets U.S. Federal evidence regulations
Isolation & Posture Checking
Meets "For SCADA-Use Only"
Meets "For SCADA-Use Only"
Isolates endpoints from assets
Isolates endpoints from assets
Posture checking on devices
Posture checking on devices
Enforced access through isolated nodes
Enforced access through isolated nodes
Disposable architecture
Disposable architecture
End-to-end encryption
End-to-end encryption
Dispel integrates with all the tools you use to run your business
Dispel vs Other remote access products
Key Features
Other Tools
Other
Tools
Remote Access
Remote Access
Encrypted tunnel
SD-WAN
VPN
Encrypted tunnel
SD-WAN
VPN
Centralized dashboard
Centralized dashboard
Protocol support
All TCP/IP protocols
VNC, RDP, SSH
Protocol support
All TCP/IP protocols
VNC, RDP, SSH
Clientless & end-to-end encrypted
Clientless & end-to-end encrypted
Password vaulting
Password vaulting
Virtual desktop workstations
DISA STIG hardened
Virtual desktop workstations
DISA STIG hardened
Joint sessions
Joint sessions
Scale
One Wicket per factory
One device per asset
Scale
One Wicket per factory
One device per asset
Scale
One Wicket per factory
One device per asset
Privileged Access Management
Privileged Access Management
Federated identity integrations/SSO
Active Directory only
Federated identity integrations/SSO
Active Directory only
Role-based access control
Role-based access control
Multi-factor authentication AAL2 & 3
Unsecure SMS
MFA AAL2 & 3
Unsecure SMS
Hybrid identity provisioning
Hybrid identity provisioning
Session recording, network activity logs
Session recording, network activity logs
Time-based access & revocation
Time-based access & revocation
Vendor self-onboarding
Vendor self-onboarding
Fleet Management
Fleet Management
Fleet management
Fleet management
Real-time health monitoring
Real-time health monitoring
Hardware deployment
Hardware deployment
Software deployment
Software deployment
Supported endpoints per node
>10,000
Supported endpoints per node
>10,000
Data Streaming
Data Streaming
Bi- & unidirectional data streaming
Bi- & unidirectional data streaming
OT, IT, and cloud connections
OT, IT, and cloud connections
File transfer with malware scanning
File transfer with malware scanning
Stepped Purdue level access
Stepped Purdue level access
Continuous Threat Detection
Continuous Threat Detection
Continuous security monitoring
Continuous security monitoring
Anomalies and events
Activity & network
Anomalies and events
Activity & network
Posture checking
Posture checking
SIEM integration
SIEM integration
Recovery & Resilience
Recovery & Resilience
Physical & logical segmentation
Physical & logical segmentation
Moving Target Defense network
Moving Target Defense network
Distributed architecture
Distributed architecture
No single point of failure
No single point of failure
No switch dependency
No switch dependency
FAQ
Industrial operations made easy
Explore our frequently asked questions to learn more about Dispel’s features, security, integration capabilities, and more
FAQ
Industrial operations made easy
Explore our frequently asked questions to learn more about Dispel’s features, security, integration capabilities, and more
What is Dispel and how does it differ from other OT security platforms?
Dispel differentiates itself from other OT security platforms by integrating Zero Trust Access (ZTA) with moving target defense, data streaming, OT DMZ unification, and Identity & Access Management (IAM) for industrial control systems (ICS). This multifaceted approach not only alters the attack surface dynamically to thwart adversaries but also ensures secure, real-time data streaming and simplifies OT DMZ architectures by consolidating access points and protocols. Moreover, Dispel's robust IAM capabilities enhance security by ensuring that only authenticated and authorized users can access critical systems. This comprehensive security model offers unparalleled protection for sectors like manufacturing, utilities, building management, and government, making it more difficult for attackers to exploit vulnerabilities compared to traditional OT security solutions.
What is Dispel and how does it differ from other OT security platforms?
Dispel differentiates itself from other OT security platforms by integrating Zero Trust Access (ZTA) with moving target defense, data streaming, OT DMZ unification, and Identity & Access Management (IAM) for industrial control systems (ICS). This multifaceted approach not only alters the attack surface dynamically to thwart adversaries but also ensures secure, real-time data streaming and simplifies OT DMZ architectures by consolidating access points and protocols. Moreover, Dispel's robust IAM capabilities enhance security by ensuring that only authenticated and authorized users can access critical systems. This comprehensive security model offers unparalleled protection for sectors like manufacturing, utilities, building management, and government, making it more difficult for attackers to exploit vulnerabilities compared to traditional OT security solutions.
How does the MTD-driven networking feature work?
The Moving Target Defense (MTD) strategy encompasses a comprehensive approach that goes beyond merely altering the attack surface of a single piece of infrastructure. It involves the use of composable components, where infrastructure elements are not only dynamically changed but also literally decommissioned and replaced with new instances automatically. This process ensures that any malware or unauthorized access does not persist between sessions. By continuously cycling through different machines, IP addresses, and configurations, MTD creates an environment where the infrastructure itself is ephemeral, greatly complicating the attacker's ability to gain a lasting foothold. This method significantly enhances security by ensuring that any potential vulnerabilities are short-lived and that the integrity of the system is maintained across sessions.
How does the MTD-driven networking feature work?
The Moving Target Defense (MTD) strategy encompasses a comprehensive approach that goes beyond merely altering the attack surface of a single piece of infrastructure. It involves the use of composable components, where infrastructure elements are not only dynamically changed but also literally decommissioned and replaced with new instances automatically. This process ensures that any malware or unauthorized access does not persist between sessions. By continuously cycling through different machines, IP addresses, and configurations, MTD creates an environment where the infrastructure itself is ephemeral, greatly complicating the attacker's ability to gain a lasting foothold. This method significantly enhances security by ensuring that any potential vulnerabilities are short-lived and that the integrity of the system is maintained across sessions.
Is my data secure with Dispel?
Dispel protects customer data by adhering to established security standards and certifications, including SOC 2 Type 2 and ISO 27001, which validate its commitment to rigorous security management practices. The platform's alignment with FIPS 199 Impact Level High and NIST 800-53 ensures that its security controls are robust and capable of safeguarding sensitive information. Dispel offers enhanced data protection through customizable data residency options and a single-tenant access infrastructure, allowing for greater control over where and how data is stored and accessed. For organizations requiring advanced levels of data security, Dispel provides the flexibility of customer-cloud and fully on-premises deployments, enabling a tailored approach to data security that meets specific organizational needs.
Is my data secure with Dispel?
Dispel protects customer data by adhering to established security standards and certifications, including SOC 2 Type 2 and ISO 27001, which validate its commitment to rigorous security management practices. The platform's alignment with FIPS 199 Impact Level High and NIST 800-53 ensures that its security controls are robust and capable of safeguarding sensitive information. Dispel offers enhanced data protection through customizable data residency options and a single-tenant access infrastructure, allowing for greater control over where and how data is stored and accessed. For organizations requiring advanced levels of data security, Dispel provides the flexibility of customer-cloud and fully on-premises deployments, enabling a tailored approach to data security that meets specific organizational needs.
Can I integrate Dispel with other tools and platforms I currently use?
Yes, Dispel is designed for seamless integration with a wide range of tools and platforms that organizations commonly use, facilitating a cohesive security posture across various systems and applications. Its architecture supports interoperability with existing IT and OT environments, including popular cloud services, enterprise resource planning (ERP) systems, and network management tools. This flexibility ensures that Dispel can be easily incorporated into your existing infrastructure, allowing for centralized management of security policies and procedures without disrupting operational workflows.
Can I integrate Dispel with other tools and platforms I currently use?
Yes, Dispel is designed for seamless integration with a wide range of tools and platforms that organizations commonly use, facilitating a cohesive security posture across various systems and applications. Its architecture supports interoperability with existing IT and OT environments, including popular cloud services, enterprise resource planning (ERP) systems, and network management tools. This flexibility ensures that Dispel can be easily incorporated into your existing infrastructure, allowing for centralized management of security policies and procedures without disrupting operational workflows.
I'm new to OT cybersecurity. Does Dispel offer any support or tutorials?
Dispel offers comprehensive support to ensure users can effectively safeguard their systems. This includes 24/7 global support to assist with any issues or questions that arise, ensuring you have access to expert help whenever needed. Additionally, Dispel offers a range of educational resources, including training sessions, tutorials, and certifications, designed to enhance your understanding and skills in OT cybersecurity. These resources are tailored to cater to various levels of expertise, from beginners to advanced users, facilitating a smooth learning curve and enabling organizations to strengthen their cybersecurity posture effectively.
I'm new to OT cybersecurity. Does Dispel offer any support or tutorials?
Dispel offers comprehensive support to ensure users can effectively safeguard their systems. This includes 24/7 global support to assist with any issues or questions that arise, ensuring you have access to expert help whenever needed. Additionally, Dispel offers a range of educational resources, including training sessions, tutorials, and certifications, designed to enhance your understanding and skills in OT cybersecurity. These resources are tailored to cater to various levels of expertise, from beginners to advanced users, facilitating a smooth learning curve and enabling organizations to strengthen their cybersecurity posture effectively.
We're raising the standards for factory optimization
See what makes Dispel better with a free 30-day trial
We're raising the standards for factory optimization
See what makes Dispel better with a free 30-day trial
We're raising the standards for factory optimization
See what makes Dispel better with a free 30-day trial
Industries
Resources
61 Greenpoint Ave, Brooklyn, NY 11222
© 2015 - 2024 Dispel, LLC & Dispel Global, Inc | Dispel and logos are Reg. U.S. Pat. & Tm. Off
61 Greenpoint Ave, Brooklyn, NY 11222
© 2015 - 2024 Dispel, LLC & Dispel Global, Inc | Dispel and logos are Reg. U.S. Pat. & Tm. Off
61 Greenpoint Ave, Brooklyn, NY 11222
© 2015 - 2024 Dispel, LLC & Dispel Global, Inc | Dispel and logos are Reg. U.S. Pat. & Tm. Off