Skip to main content
All Posts By

Ryan Fahey

Preparing for Escalating Cyber Threats

By Blog, Event

Governments around the world have issued warnings about escalating cyber threats following the invasion of Ukraine by Russia. The Cybersecurity and Infrastructure Security Agency (CISA) has launched the Shields Up campaign and offers a range of no-cost cyber hygiene services to help organizations to prepare. If you have not already done so, now is the time to verify your network access protection. Ensure multi-factor authentication and review your firewall configurations to:

    1. Restrict all remote access rules on a need-to-know basis
    2. Disable all ports and protocols that are not essential
    3. Verify your network segmentation

Please reach out if you need guidance or support, the NP team is here to help.

Contact us here.

GRC Outlook: Solidifying Cyber Resiliency

By Blog

As the frequency and sophistication of attacks increase, not only against traditional IT networks but also against Operational Technology (OT) networks, it is making way for more cybersecurity challenges. The pressure from cyber threats is reaching new highs and organizations are realizing that achieving perfect security is unrealistic. To align with these challenges, businesses are adapting their security strategy to improve cyber resiliency. However, the journey to make cyber resiliency a reality as well as making it operational is not an easy endeavor. This is where Network Perception is making an impact by delivering solutions that verify industrial control systems protection by ensuring network access security as the first line of defense. “Our lightweight independent verification and visualization platform provides complete network transparency and continuous mapping to better support cybersecurity compliance and operationalize cyber resiliency. We visualize the security posture to ensure that there’s no blind spot and make sure that all the stakeholders are involved in this journey towards resiliency,” Robin Berthier, Co-Founder, and CEO, Network Perception. 

What makes Network Perception a pioneer in the industry is its lightweight, robust, and safe network security solution. The company offers a completely frictionless deployment and instant value for its customers who are under stringent compliance and cybersecurity pressure. Moreover, its solutions are highly usable for both technical and non-technical users, thanks to the unique design. Moreover, the solution’s progressive data ingestion system provides values even if a subset of network devices is imported. “Our solutions are crafted to be as intuitive as possible, the user interface is elegant and simple so everyone can understand network risk exposure immediately, regardless of their technical background,” explains Berthier.

Instantly Visualize the Network Map

Network Perception’s instant network visualization platform is called NP-View. The platform solves compliance and security audit challenges by performing an automated and comprehensive analysis of a client’s network device configuration files. Packaged as a desktop application or server-based application, it uses the configuration files from firewalls, routers, and switches to instantly visualize the network topology. The network visualization enables anyone to understand compliance and security issues instantly. The results of the automated analysis can be seamlessly exported into actionable reports. In short, NP-View builds a model of a network that accurately represents how each network device allows and denies communication. This model computes the complete set of possible paths among network assets. “There’s no other platform where you can visualize the network in a lightweight, fast way, like Network Perception’s. ” extols Berthier. 

In addition, the solution will automatically identify overly permissive rules or misconfigurations that could put your infrastructure at risk. It can also compute the connectivity in the network based on the configurations without touching the network. “First, we input the configuration file of the network devices and display a visual map of your network. Second, we do a risk assessment. And finally, we compute a  path analysis to automatically verify your correct network segmentation,” explains Berthier.

The Deep Modeling Technology

The first step in defending  a network is to know that network extremely well. The knowledge of a network configuration is the best pro-active line of defense to protect critical assets against attacks. At Network Perception, the team helps its clients elevate that understanding and align everyone with the same comprehension of how the network is configured. This way, Network Perception’s customers can monitor their network security control with ease.

Network Perception’s innovative cyber resiliency solution comes with a deep network modeling technology to automatically verify network segmentation and provide instant firewall risk assessment. The added comprehensive REST API easily integrates within the larger cybersecurity ecosystem. The solutions’ read-only deployment feature independently verifies network configurations without increasing the attack surface. 

As a cybersecurity solution provider, Network Perception focuses on developing technology to support cyber resiliency, enhancing the customers’ ability to verify faster and to visualize how their network architecture is efficiently protecting their critical assets or not. In most OT environments, a single person is usually able to intimately understand how the network is actually configured. The larger team relies on network diagrams that are outdated or incorrect. Moreover, most networks would accidentally connect non-critical to critical zones. NP-View is designed to automatically and effortlessly verify those issues while clarifying network architecture for all stakeholders.

The Invention of Automated Security

The story of the inception of Network Perception dates back to when CEO and Co-Founder Robin Berthier was working as a research scientist with funding from the Department of Energy and the Department of Homeland Security at the University of Illinois in Champaign, Urbana. The government was extremely concerned with the risk of cyber attacks against the electrical grid and asked the researchers including Berthier to develop the next generation of network modeling solutions. This led to the development of an initial prototype to better understand networks, and better verify how access policies protect critical assets. Berthier adds, “We were very fortunate from day one of the research project to be able to work closely with industry partners. We partnered with electric utilities in the Midwest, including Ameren  and ComEd, to understand their challenges and their pain points. We received continuous feedback as we developed the initial prototype.” This ultimately led to the founding of Network Perception and its evolution as a leading cybersecurity company. 

The team realized the complexity and monotony  of having to manually go through thousands of policy rules to try to understand exactly how firewalls in the network are blocking unwanted access to critical assets and critical industrial equipment. Network Perception’ solution automates the entire firewall audit process and enables compliance and security  teams to shift from that tedious manual, lengthy review process into a much faster, automated and comprehensive workflow, while removing the risk of human errors.

Embracing the Zero-Trust Culture

Over time, Network Perception has evolved as one of the most innovative network security solution providers in the industry with over 100 customers, including half of the largest 30 utilities in the U.S. The company has also established a strong relationship with NERC and the electric utility industry. As part of its growth plan, Network Perception is launching a new set of licensing tiers for its NP-View product. The three tiers include NP-View Essential—the fastest solution to determine if network devices are in or out of compliance. NP-View Essential is the entry-level version to support the needs of organizations that don’t yet have an independent verification process established. The second tier is NP-View Professional, a solution that continuously verifies if a network architecture is correctly configured to protect mission-critical assets. The Professional version is best suited for organizations with a consistent and documented independent verification process in place. It builds on the Essential version by enabling users to track changes and to augment their network verification and visibility capabilities with vulnerability information. 

Finally, the third tier is NP-View Enterprise, the most advanced and customizable platform to continuously check if critical assets are protected 24/7 by best-in-class defense-in-depth. The Enterprise version of NP-View is designed for organizations that have measurable security policies and procedures. It builds on the Professional version by adding dashboards, custom fields, advanced workflow automation, and full API integration. “As part of the growing zero-trust culture , it is vital to invest in a  read-only and continuous verification solution that can give you a clear picture of your risk exposure without adding any new risk to your infrastructure. ” concludes Berthier.


CS2AI Cybersecurity 4 Energy Virtual Symposium Recording

By Announcement, Blog

In case you missed it, we partnered with (CS)²AI and Q-Net Security on January 19th for a virtual symposium focused on securing and protecting electrical operations and power grids. Our expert panel of thought leaders in the electric sector discussed tangible recommendations and best practices for electric utilities to address current and upcoming compliance and cybersecurity challenges.

Our CEO and Co-Founder, Robin Berthier, demonstrated how to improve firewall rule change review through a 5-step workflow. A timely topic since a majority of attendees selected network architecture and segmentation as their top priority when asked which cybersecurity area would they most like to improve this year.

See what else the panel had to say:

  • Melissa Hathaway | President of Hathaway Global Strategies | Electric Sector Digital Resilience – A Global Perspective
  • Marc Rogers | VP of Cybersecurity at Okta | Hands-on Experience on Exploit
  • Ben Sooter | Principal Project Manager | Responding to High Impact Cyber Security Events in Operations
  • Branko D. Terzic | Former FERC Commissioner | Challenges for Electric Utilities
  • Philip Huff | University of Arkansas | Vulnerability Management for Electric Utilities
  • Saman Zonouz | Associate Professor at Rutgers University | Threats to Programmable Logic Controllers
  • Todd Chwialkowski | EDF Renewables | Implementing Electronic Security Control

View the recording of the Symposia here:

The Importance of Velocity in Cybersecurity

2022 Resolution: Cybersecurity Verification

By Blog

Due to heightened risk of cyber attack, the Cybersecurity and Infrastructure Security Agency (CISA) recently published a short checklist of urgent, near-term steps to reduce the likelihood and impact of a potentially damaging compromise. The recommendations include validating remote access to the organization’s network and confirming that all ports and services that are not essential for business purpose have been disabled. We invite every organization to not only review the list of controls but to also invest in independent verification of their correct implementation. Verified cybersecurity makes all the difference between catastrophic failure and operational resiliency. This is particularly true for OT networks where configuration changes can erode security controls such as network segmentation over time.

View the Cybersecurity and Infrastructure Security Agency Checklist Below:

Abstract of modern high tech internet data center room with rows of racks with network and server hardware.

Event & Conference Schedule – Q3 & Q4 2021

By Announcement
Come check out our upcoming Sponsorship and Speaking Events though the end of this year, we have several engagements both virtually and in person we would love for you to come see us at. See below for a brief outline of each event.


Cyber Security for Critical Assets USA Summit (CS4CA) | Sept. 16-17 | Virtual 
Network Perception will be Sponsoring the CS4CA event this year, if you’re attending please be sure to stop by our Virtual Booth and say hello between Keynote Presentations!
SANS Industrial Solutions Forum 2021| Sept. 17th |  1:30 pm EDT  | Webinar 
The SANS Industrial Solutions Forum 2021 is one of the premier virtual events on the topic of OT security and compliance. Dr. Robin Berthier will be joining the Panel as well as hosting his own 35 minute speaking slot at 10:30 am EDT.


The 8th Cyber & SCADA Security for Power & Utilities conference will be taking place virtually this year with Dr. Robin Berthier as a featured panelists speaking on the topic of “Stronger Cyber Resiliency through Verification, Visibility & Velocity” on Sept. 22nd at 6:50am CST.
EnergySec Security & Compliance Summit | Oct. 4-6 | In-person | Anaheim, CA
The EnergySec Security & Compliance Summit will be one of the first live in-person speaking events for critical infrastructure and is returning for it’s 16th Anniversary! The event will take place in Anaheim California and Dr. Robin Berthier will be speaking on October 4th from 10-10:30am in Trilllum, Room B, on the topic of “Protecting your Crown Jewels with Verification, Visibility, and Velocity.”


A Keynote presentation will be delivered by Dr. Robin Berthier the next day on October 5th from 2:15-3:15pm on “You can’t protect what you can’t see: Network visibility provides the foundation for Industrial security“.
SGO’s 3rd Utility Cyber Security Forum | Oct. 5-7 | In-person & Online | Chicago, IL
SGO’s Utility Cyber Security Forum is back for it’s third year both In-Person and Online. Network Perception will be Sponsoring the event as well as hosting a Happy Hour on 10/5 at River Roast located at 315 N LaSalle St, Chicago IL.


Dr. Robin Berthier will also be speaking on Wednesday, 10/6 from 3-3:30pm CT on “Network Compliance Automation: How to Streamline the Firewall Audit Process”.