Loading...
Home 2018-05-29T13:33:03+00:00

NETWORK SEGMENTATION AND HARDENING

By segmenting the production network into different zones and creating a DMZ with dual logical firewalls, a secure network is obtained. This will make it harder for malware to spread and affect the production.

By segmenting the production network into different zones and creating a DMZ with dual logical firewalls, a secure network is obtained. This will make it harder f

APPLICATION WHITELISTING

By listing all applications on a computer and only allow them and nothing else to execute it will give you a good protection against malware. This setup works perfect for the automation environment since there is no need for updating any definitions like an antivirus product.

In antivirus you do the opposite (blacklisting) i.e. list everything that is harmful. Antivirus requires the list to be updated all the time.

OT (OPERATIONAL TECHNOLOGY) SECURITY POLICY

Many companies have an IT policy but are missing an OT policy. Together we can help you create that.

Many companies have an IT policy but are missing an OT policy. Together with you we can help you create that.

Many companies have an IT policy  Together with you we can

BACKUP PROCEDURES

A standard way of backing up and restoring industrial computers is an essential part of recovering from cyber-attacks and failures. We recommend saving the backups in a central place and not storing them on a local USB hard disk.

SYSTEM HARDENING

By shutting down Windows features and services not needed and uninstalling unnecessary software a production computer gets more secure. This also includes disabling USB memories and applying a standard for user accounts with strong passphrases. We can help you through this process.

SECURE REMOTE ACCESS

We will help you design a safe way of connecting remotely to your production network. Many industries today still have unsegmented OT networks with direct access to both IT and the internet.

ALL THIS SOUND GREAT? ASK OUR LOCAL SECURITY EXPERTS ABOUT POSSIBLE NEXT STEPS FOR YOU!

Ask An Expert

 

If you are attacked, some questions:

How much money will you lose if the production is standing still?
Do you have a plan if this happens?
Who will get blamed for it?
What if your control logic code or historian data is stolen?
Do you have a recovery plan?

See OT security as way of reducing business risk but also a way of improving the daily production work
(backups, standardized remote access, upgrading old equipment, new routines etc)

Some consequences of a compromised OT system:
Impact of reputation
Loss of production
Loss of IPR
Machine damage
Loss of lives

OpShield has given us a window of visibility into everything that’s actually happening on our production network. Let me just say, it was an eye-opening experience.

VP Engineering

CAREER OPPORTUNITIES

Are looking for a job on the frontier of the cyber security, we can offer excellent opportunities. Read about us and how we work >>

WANT TO LEARN MORE ABOUT US?

Everybody needs to prepare, time is of an essence start today?

MAKE ENQUIRY