Get in touch with our specialists, please fill in the form below, and we will get back to you as soon as we can
How can you be mobile and have access to all data and still be secure? Within utilities and water a lot of the systems are critical and the potential effects grave. See how OpShield secure your mobile strategy.
Most in the water business would say yes reasonable but tend to forget that the most common threat is not an external attack, but a computer that is infected is connected on the network. The normal procedure if IT is to block and disconnect when something is detected. But how do you disconnect a process dependent computer? That can be done of course, but now there is a solution to these challenges.
A process network always needs to be able to run and therefore can’t be protected in the same way as an ordinary IT network. OpShield is working with sectioning of the network and with baselining the traffic to address this. In this way you first monitor all traffic and class what is right and then get the possibility to set alarms if something else happens. Also working with sectioning brings down the affected area and speeds up detection especially in process networks where frequent patching is not common.
It is easier said than done to determine if it is the right traffic. Therefore OpShield has a built in packet inspection all the way down in the protocols like OPC, Profinet and Modbus. In that way is it possible for the OpShield system to determine which nodes that is and should talk to whom and on what protocol which makes attacks so much harder.
In order to secure that OpShield detects new threats and new ways to attack is should be updated. The same goes for new industrial protocols and other types of infrastructure devices. The company behind OpShield comes for the cyber security industry and started off by ”hacking” themselves in to Shell as part of a project. As time went by did they realize that there was a need for an easy to configure industrial security solution and OpShield was born.
We recommend the following steps in the implementation of OpShield:
STEP 1: We first make a quick assessment, where we walk you through the differences between IT and OT along with walkthrough of your current network and wishes. You will get a report with our recommendations and some training material in how you should work with OT security.
STEP 2: In step two we install your first OpShield device to be able to assess your network and start building a baseline.
STEP 3: After a few week will we come back to go through the results and the baseline. With that as a foundation we help you to install OpShield and get you to the right level of security.
Securing critical assets in a digitally connected world.
As production systems become more interconnected, the exposure to network-based cyber incidents increases, putting production, reputation, and ultimately profits at risk.
Pop up content