We help you to get the most out of your security budget and resources
The Best Solution For Your Security
Organisational and technical security controls are intended to safeguard against various types of cyberattacks and misuse of assets – including DDoS attacks, mass malware, and targeted ransomware attacks.
The challenge from a security standpoint therefore includes a networked OT infrastructure comprising of highly modern systems alongside 20-30 year old machines. While attackers have so far focused on office IT, it is reasonable to expect that attacks will also be conducted via OT in the future. In any scenario, systematic management for OT security risks is advised.
Our provider directory - are you already part of it?
Our customers can receive offers from the following providers - and all others
Offer comparison of solutions incl. service for OT monitoring at a gas network operator
System For Central Attack Detection
Project example: OT Monitoring
these are 12 building blocks for OT Security
From Our Perspective
Operator is in charge (work management), and there are local contacts
Risk-based approach based on maximum damage, sensitive data
Machine-related assets, ideally in a database (CMDB)
Horizontal (OT – IT with DMZ) and vertical by lines, facilities – NIST reference architecture
Also, partially possible with legacy systems, scan stick, data locks
Patches in OT are not or hardly possible, focus on systems with access from outside
Dedicated OT campaigns to highlight risks as well as proprietary formats
For larger OT backup tools, processes to create backups after changes
Scenarios from single machine failure to all systems with IP address
OT Remote Access
Today, it is necessary, but it is complex to implement. Access restriction, internal enabling, roles/rights, and scheduling are all options
Already in specifications, acceptance criteria, demand transparency
Network-based, useful for stable processes, and cost-benefit analysis is crucial