Contact us

Talk to a specialist

Get in touch with our specialists, please fill in the form below, and we will get back to you as soon as we can

I hereby approve Novotek\'s personal data policy

Cyber security for Water and waste water and other utilities

How can you be mobile and have access to all data and still be secure? Within utilities and water a lot of the systems are critical and the potential effects grave. See how OpShield secure your mobile strategy.

How secure are you? 

cyber security nätverkskopplade enheter

Most in the water business would say yes reasonable but tend to forget that the most common threat is not an external attack, but a computer that is infected is connected on the network. The normal procedure if IT is to block and disconnect when something is detected. But how do you disconnect a process dependent computer? That can be done of course, but now there is a solution to these challenges.

OpShield is the answer to the challenges of security in process networks

cyber security opshield
A process network always needs to be able to run and therefore can’t be protected in the same way as an ordinary IT network. OpShield is working with sectioning of the network and with baselining the traffic to address this. In this way you first monitor all traffic and class what is right and then get the possibility to set alarms if something else happens. Also working with sectioning brings down the affected area and speeds up detection especially in process networks where frequent patching is not common.

Secure that the right communication is there

cyber security

It is easier said than done to determine if it is the right traffic. Therefore OpShield has a built in packet inspection all the way down in the protocols like OPC, Profinet and Modbus. In that way is it possible for the OpShield system to determine which nodes that is and should talk to whom and on what protocol which makes attacks so much harder.

Continuous updates

cyber security

In order to secure that OpShield detects new threats and new ways to attack is should be updated. The same goes for new industrial protocols and other types of infrastructure devices. The company behind OpShield comes for the cyber security industry and started off by ”hacking” themselves in to Shell as part of a project. As time went by did they realize that there was a need for an easy to configure industrial security solution and OpShield was born.  

The road to a secure process

cyber security

We recommend the following steps in the implementation of OpShield:

STEP 1: We first make a quick assessment, where we walk you through the differences between IT and OT along with walkthrough of your current network and wishes. You will get a report with our recommendations and some training material in how you should work with OT security.

STEP 2: In step two we install your first OpShield device to be able to assess your network and start building a baseline.

STEP 3: After a few week will we come back to go through the results and the baseline. With that as a foundation we help you to install OpShield and get you to the right level of security.  


OpShield: Purpose-built Security for Industrial Environments

As production systems become more interconnected, the exposure to network-based cyber incidents increases, putting production, reputation, and ultimately profits at risk.

An Executive Guide to Cyber Security for Operational Technology

Securing critical assets in a digitally connected world.

Contact us

Fill in the form below or call our sales support +46 (0)40 31 69 55.

I hereby approve Novotek's personal data policy