Protect your control system against hackers and cyber threats

March 2011 Products & Solutions, Infrastructure

The electrical, environmental and operational requirements of scada and control systems make IT-focused security solutions unsuitable for use in industrial networks.

As a result, the vast majority of these systems are operating with little or no protection against accidental or malicious cyber attacks. Even a single infected USB key can shut down an entire plant.

Available from IAC, the Hirschmann EAGLE Tofino line of security switches combines a rugged security appliance with a collection of software modules that together provide practical and effective industrial network security, which is simple to implement and does not require plant shutdowns.

You may not be attacked by a serious hacker, but conventional control networks are extremely vulnerable to simple day to day security issues.

Poor network segmentation, unprotected points of entry into the network, soft targets such as unpatched PCs and vulnerable PLCs, and human error can result in significant production losses and even safety issues.

The Tofino Industrial Security Solution is a distributed security solution that quickly and cost-effectively implements cyber security protection within your control network. Tofino is designed from the ground up with a rugged environment, staff skills and needs of industry in mind - it protects better and is easier to install than IT firewalls and other security products.

Tofino's flexible architecture allows you to create security zones - Zone Level Security - throughout your control network to protect critical system components. The Hirschmann EAGLE Tofino models can be incorporated into process control and scada systems to provide improved safety, network security and performance of industrial control systems.

Tofino can be installed and implemented in a live network with no special training and no pre-configuration. And best of all, it helps you avoid expensive down time and achieve optimal performance in your plant.

Key benefits:

* No IT knowledge required.

* Enhanced security and safety - extend cyber security down into the control network.

* Simplified regulatory and standards compliance.

For more information contact Vladimir Milovanovic, IAC, +27 (0)12 657 3600, vladimir@iacontrol.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.