Military-grade solution to protect industrial control systems

Posted on 13 September 2013.

Organisations will now be able to bring their industrial control systems technology into the modern era and realise the benefits of increased connectivity while also reducing the risk of cyber attack

BAE Systems Detica launched IndustrialProtect, a military-grade solution designed to protect the industrial control systems of organisations such as power plants, oil refineries or automated manufacturing plants from cyber attack, allowing them to both modernise their legacy systems as well as improve their security.
The major applications for the IndustrialProtect solution will be organisations within the Defence, Energy, Utilities and Natural Resources sectors, where industrial control systems are integral to their efficiency, growth and productivity.

image
The security risks to these organisations can also have “real-world” impacts – affecting not only the safety and ability of the organisation to operate, but also the potential to cause significant economic, human and environmental harm should a security breach incident occur.


IndustrialProtect is launching at a time when operational networks are increasingly vulnerable. The on-going convergence of Operational Technology (OT) and enterprise IT networks is bringing great benefits, such as increased automation, more centralised key functions and better management information. But the convergence also creates greater risk as it increases the opportunity for attack through unauthorised access or espionage and the manipulation of data and data loss caused by both targeted and non-targeted attacks.
IndustrialProtect effectively mitigates these risks by using cutting-edge technology to ensure the security of industrial control systems. It is the only solution that provides all of the necessary security controls in a single appliance, and also delivers unrivalled security enforcement while also enabling greater business efficiency, secure information sharing and connectivity.
Five key features:

  • Implementation of network segmentation without breaking critical business process
  • Prevention of unauthorised systems from exchanging information
  • Assurance that the integrity of information is preserved from source to destination
  • Transparency to existing systems and a very low attack surface
  • Full remote management from the industrial control system and back to the system.

Read more:

http://www.net-security.org/secworld.php?id=15564

About these ads

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s