Protect your control system against hackers and cyber threats

March 2011 Products & Solutions, Infrastructure

The electrical, environmental and operational requirements of scada and control systems make IT-focused security solutions unsuitable for use in industrial networks.

As a result, the vast majority of these systems are operating with little or no protection against accidental or malicious cyber attacks. Even a single infected USB key can shut down an entire plant.

Available from IAC, the Hirschmann EAGLE Tofino line of security switches combines a rugged security appliance with a collection of software modules that together provide practical and effective industrial network security, which is simple to implement and does not require plant shutdowns.

You may not be attacked by a serious hacker, but conventional control networks are extremely vulnerable to simple day to day security issues.

Poor network segmentation, unprotected points of entry into the network, soft targets such as unpatched PCs and vulnerable PLCs, and human error can result in significant production losses and even safety issues.

The Tofino Industrial Security Solution is a distributed security solution that quickly and cost-effectively implements cyber security protection within your control network. Tofino is designed from the ground up with a rugged environment, staff skills and needs of industry in mind - it protects better and is easier to install than IT firewalls and other security products.

Tofino's flexible architecture allows you to create security zones - Zone Level Security - throughout your control network to protect critical system components. The Hirschmann EAGLE Tofino models can be incorporated into process control and scada systems to provide improved safety, network security and performance of industrial control systems.

Tofino can be installed and implemented in a live network with no special training and no pre-configuration. And best of all, it helps you avoid expensive down time and achieve optimal performance in your plant.

Key benefits:

* No IT knowledge required.

* Enhanced security and safety - extend cyber security down into the control network.

* Simplified regulatory and standards compliance.

For more information contact Vladimir Milovanovic, IAC, +27 (0)12 657 3600, vladimir@iacontrol.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
A year of integration, intelligence, and innovation
Suprema neaMetrics Products & Solutions
From the cloud-native CLUe platform and CoreStation 20 controller to the global debut of BioStar X, Suprema has redefined what connected, AI-driven security means for enterprises.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.