Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Proven cybersecurity solution with OT and IT deep understanding?

Industry Automation and Control Forum

This forum is addressing industrial automation design & engineering, operations, asset performance, cyber security and digital transformation for Plants & Machines.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Industrial Automation
  • Industry Automation and Control Forum
  • Proven cybersecurity solution with OT and IT deep understanding?
Options
  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Bookmark
  • Subscribe
  • Mute
  • Printer Friendly Page
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Experts
User Count
Bastian_Schmitz
Admiral Bastian_Schmitz Admiral
31
LeTomas
Lt. Commander LeTomas Lt. Commander
11
RoozeeR
Lt. Commander RoozeeR Lt. Commander
6
JerryBartlemay
Lieutenant JG JerryBartlemay Lieutenant JG
6
View All

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Back to Industry Automation and Control Forum
Anonymous user
Not applicable

Posted: ‎2019-03-14 04:25 AM . Last Modified: ‎2019-03-14 07:31 AM

0 Likes
4
4880
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-03-14 04:25 AM . Last Modified: ‎2019-03-14 07:31 AM

Proven cybersecurity solution with OT and IT deep understanding?

I am looking for a proven cyber security technology with deep understanding of our OT networks and best capabilities in avoiding threats across IT and OT. Can you suggest a solution please?

Labels
  • Labels:
  • Cyber Security
Reply

Link copied. Please paste this link to share this article on your social media post.

  • All forum topics
  • Previous Topic
  • Next Topic
Replies 4
Martijn_
Lt. Commander Martijn_
Lt. Commander

Posted: ‎2019-03-15 01:57 AM

1 Like
0
4874
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-03-15 01:57 AM

Look at the ISA-99 or IEC62443 for requirements Cybersecurity OT.  The best solution for your architecture depents on the security levels that you need.

Reply

Link copied. Please paste this link to share this article on your social media post.

Matt_Theakstone
Crewman Matt_Theakstone Crewman
Crewman

Posted: ‎2019-03-22 06:00 AM

1 Like
0
4861
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-03-22 06:00 AM

We have a deep knowledge of the IT and OT layer and our global cyber security center of excelence has a deep appreciation of the differences between the OT and IT layers. The vendor-agnostic services provided by our skilled professionals protect your entire critical infrastructure with help to assess your risk, implement cyber-specific solutions and maintain your onsite defenses over time.

 

Specifically in the OT space for example, we have partnered with Nazomi to provide Cyber Secure defense and detection from a hardwrae solution. Using a pioneering artificial intelligence approach, SCADAguardian delivers the most accurate asset discovery, network modeling and real-time monitoring available. OT situational awareness and risk management are significantly improved. Please reach out to me if you wish to know more and we can take it from there

Reply

Link copied. Please paste this link to share this article on your social media post.

G_Enigmedia
Ensign G_Enigmedia
Ensign

Posted: ‎2019-03-26 03:22 AM

0 Likes
0
4835
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-03-26 03:22 AM

Hi,

 

Could you please provide more information on your OT networks?

 

Are those networks distributed in geography or all of them are in the same facility?

Do you have different vendors doing predective maintenance over those networks?

 

It would be great if you can give some more information about your maturity level in cybersecurity.

 

Do you have security plan?

Have you deployed first security levels of IEC-62443-3-3?

How are you monitoring your network and updating/patching your software/firmware?

 

I have attached some information regarding the requirements of IEC-62443-3-3 and how you can achieve them, for the sake of clarity.

 

Best regards,

Gerard

Attachments
Reply

Link copied. Please paste this link to share this article on your social media post.

Anonymous user
Not applicable

Posted: ‎2019-03-31 03:44 PM

1 Like
0
4821
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-03-31 03:44 PM

Schneider and Claroty understand that many corporate IT and IT security teams have no visibility or understanding into the  OT and production environment (regardless of industry or field application). So firms seeking to limit their cybersecurity risks need something with deep understanding, purpose-built for plant and production environments.

Claroty is a Silver Partner with Schneider and has a proven solution to safely and passively monitor, detect and respond to threats and misuse, malicious behavior and cyber risk activities known or unknown across the entire production environment. We have pioneered in the field of detecting and hunting cyber threats, automatically identifying assets, and providing in-depth understanding of communications on the network from edge to legacy and even serial field devices.

 

The technology has been adapted from military-grade ICS and SCADA experience and that knowledge is now protecting some of the largest networks in the world including industrial equipment manufacturer's plants. Contact Schneider Cybersecurity Services or see us at www.claroty.com for a demo! 

  • Tags:
  • anomaly detection
  • Claroty
  • cyber risk
  • cyber risks
  • cyber security
  • ICS
  • ICS cybersecurity
  • ICS SCADA
  • industrial cyber security
  • industrial cybersecurity
  • OT cybersecurity
  • scada
  • threat detection
Reply

Link copied. Please paste this link to share this article on your social media post.

Preview Exit Preview

never-displayed

You must be signed in to add attachments

never-displayed

 
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of