Industry Automation and Control Forum
This forum is addressing industrial automation design & engineering, operations, asset performance, cyber security and digital transformation for Plants & Machines.
Posted: 2019-03-14 04:25 AM . Last Modified: 2019-03-14 07:31 AM
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-03-14 04:25 AM . Last Modified: 2019-03-14 07:31 AM
I am looking for a proven cyber security technology with deep understanding of our OT networks and best capabilities in avoiding threats across IT and OT. Can you suggest a solution please?
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-03-15 01:57 AM
Look at the ISA-99 or IEC62443 for requirements Cybersecurity OT. The best solution for your architecture depents on the security levels that you need.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-03-22 06:00 AM
We have a deep knowledge of the IT and OT layer and our global cyber security center of excelence has a deep appreciation of the differences between the OT and IT layers. The vendor-agnostic services provided by our skilled professionals protect your entire critical infrastructure with help to assess your risk, implement cyber-specific solutions and maintain your onsite defenses over time.
Specifically in the OT space for example, we have partnered with Nazomi to provide Cyber Secure defense and detection from a hardwrae solution. Using a pioneering artificial intelligence approach, SCADAguardian delivers the most accurate asset discovery, network modeling and real-time monitoring available. OT situational awareness and risk management are significantly improved. Please reach out to me if you wish to know more and we can take it from there
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-03-26 03:22 AM
Hi,
Could you please provide more information on your OT networks?
Are those networks distributed in geography or all of them are in the same facility?
Do you have different vendors doing predective maintenance over those networks?
It would be great if you can give some more information about your maturity level in cybersecurity.
Do you have security plan?
Have you deployed first security levels of IEC-62443-3-3?
How are you monitoring your network and updating/patching your software/firmware?
I have attached some information regarding the requirements of IEC-62443-3-3 and how you can achieve them, for the sake of clarity.
Best regards,
Gerard
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-03-31 03:44 PM
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-03-31 03:44 PM
Schneider and Claroty understand that many corporate IT and IT security teams have no visibility or understanding into the OT and production environment (regardless of industry or field application). So firms seeking to limit their cybersecurity risks need something with deep understanding, purpose-built for plant and production environments.
Claroty is a Silver Partner with Schneider and has a proven solution to safely and passively monitor, detect and respond to threats and misuse, malicious behavior and cyber risk activities known or unknown across the entire production environment. We have pioneered in the field of detecting and hunting cyber threats, automatically identifying assets, and providing in-depth understanding of communications on the network from edge to legacy and even serial field devices.
The technology has been adapted from military-grade ICS and SCADA experience and that knowledge is now protecting some of the largest networks in the world including industrial equipment manufacturer's plants. Contact Schneider Cybersecurity Services or see us at www.claroty.com for a demo!
Link copied. Please paste this link to share this article on your social media post.
Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.