With computers and computing technologies being used in many domains (from manufacturing to ICS (Industrial Control Systems)) the need for cyber security is no longer limited to desktop computers and servers. If malicious entities get access to your industrial applications, the damage can be monumental. This lends critical importance to maintaining cybersecurity. More than two-thirds of experts rate the threat level to ICS as “high” or “critical”. For businesses operating critical infrastructure systems (water/electricity supply systems, nuclear reactors etc.), the potential risks go far beyond business disruption or loss of reputation. They are subject to extremely high risk of economic, social and environmental damage if not protected effectively.

Some of the most serious threats to ICSes are malware like “worms” designed to derail or shut down factories, plants etc. (like the Conficker worm) or ransomware which can take control of your ICS and continue to do so until you pay the hackers. With both corporate networks and ICSes coming under the scanner of malware and targeted attacks, the need for specialised industrial cyber security solutions has never been higher.

Our suite of solutions for industrial cyber security consists of:

Knowledge

This approach consists of training and awareness programs for your employees, including the ICS operators and engineers. In this, they are made aware of potential threats and most effective methods to protect against them. These also include simulation programs designed to simulate real-life cyberattacks on ICSes and skill development programs for professionals to develop their skills in specific areas.

Software Solutions

Software-based solutions for protecting ICSes against several types of threats take a multi-pronged approach, which can be best summarised as given below.

  • Type of Threat

  • Unauthorized software execution
  • Malware

  • Unauthorized devices connecting to the ICS
  • Unauthorized wireless connections
  • Network attacks
  • Security Solution

  • Application whitelisting to allow execution of authorised software only
  • Advanced anti-malware signature-based detection engines for accurate, fast detection of malware
  • Device control allowing only authorised devices to connect to ICS
  • Wi-Fi network control
  • Host-based firewall to prevent outside software from accessing the ICS

Solution implemented using: