Cyber security for utilities

How shall you secure that no one by mistake infect your systems or be able to extract data from the process without risk? Within energy are the critical systems many and the effects grave. See how OpShield can make you secure and become mobile.

Are you secure that you have no breach? 

cyber security nätverkskopplade enheter

Yes would most in utilities answer but many forget that the most common attacks comes from the inside due to unaware employees. In addition to that most today would like to connect the process network with at least the internal network and those that have use the standard IT rules for this. But can you apply the same rules for OT? The most common IT rule at an attack is to disconnect the node and that is not possible to do when it comes to process network. Now is the solution to all these challenges.

OpShield is the answer to secure the process network

cyber security opshield
The process network always have to run and can’t be protected in the same way as ordinary IT. Therefore OpShield is working with sectioning and the use of baselines for the traffic. In that way you can monitor and class what should be accepted and then you have the possibility to set alarms for any other situation. You also secure that not the whole process network is affected if you get an internal attack.

Secure that the right communication is there

cyber security

It is easier said than done to determine if it is the right traffic. Therefore OpShield has a built in packet inspection all the way down in the protocols like OPC, Profinet and Modbus. In that way is it possible for the OpShield system to determine which nodes that is and should talk to whom and on what protocol which makes attacks so much harder.

Continuous updates

cyber security

In order to secure that OpShield detects new threats and new ways to attack is should be updated. The same goes for new industrial protocols and other types of infrastructure devices. The company behind OpShield comes for the cyber security industry and started off by ”hacking” themselves in to Shell as part of a project. As time went by did they realize that there was a need for an easy to configure industrial security solution and OpShield was born.

The road to a secure process

cyber security

We recommend the following steps in the implementation of OpShield:

STEP 1: We first make a quick assessment, where we walk you through the differences between IT and OT along with walkthrough of your current network and wishes. You will get a report with our recommendations and some training material in how you should work with OT security.

STEP 2: In step two we install your first OpShield device to be able to assess your network and start building a baseline.

STEP 3: After a few week will we come back to go through the results and the baseline. With that as a foundation we help you to install OpShield and get you to the right level of security.  

Downloads

OpShield: Purpose-built Security for Industrial Environments

As production systems become more interconnected, the exposure to network-based cyber incidents increases, putting production, reputation, and ultimately profits at risk.

An Executive Guide to Cyber Security for Operational Technology

Securing critical assets in a digitally connected world.

Contact us

Fill in the form below or call our sales support +46 (0)40 31 69 55.