Industrial Control System Security - Factories, Mass Production Process


  • Product Code:3155INSTALLATION


Availability: In Stock
  • Ksh0.00

  • Ex Tax:Ksh0.00

Industrial control systems (ICS) are used to operate industrial processes and allow the control and management of power plants, water infrastructure, manufacturing facilities, building management systems and large ships etc.

ICS are considered critical infrastructure, as damaging them can potentially result in real-world catastrophic consequences, such as physical damage of different types including blackouts, disruptions to an entire city’s water supply and infrastructure and substantive threat to human lives.

The main reasons for the dramatic increase in threats to these critical systems are the convergence of operational technology (OT) and IT networks and the development of the Industrial Internet of things (IIoT), causing the systems to become extremely vulnerable.

 

Substantial Security Benefits:

 

·         Active querying of the SCADA database without the need to compromise the security of the system

·         Ability to distinguish anomalies that are caused by a code (malware) from those caused by the system's operator, which are usually legitimate changes in the ICS (that did not occur during the learning phase)

·         Ability to detect cases in which communication between actuators and sensors was disrupted, most likely due to an attack, and pinpoint the system components that are involved

·         Detection of incidents where the engineering limits were violated / manipulated in packets that are sent directly to the controller

·         Automatic whitelisting of executables that are necessary for the HMI-server, and preventing all other executables

·         Compatible with all major standards: NIST 800-82, NIST 800-53, NERC CIP, ISA-99

·         Compatible with major SIEM providers

 

·         Monitors the traffic between all assets in the network, including HMI servers, PLCs, RTUs and VFDs

·         Alerts in the case of any abnormal behavior

 

·         Monitors against Vulnerabilities and known exploits

 

·         Monitors against changes in the PLC firmware/ logic

 

·         Enforces security policies defined by the plant control engineers

Write a review

Note: HTML is not translated!
   Bad           Good