This page contains a Flash digital edition of a book.
Safety in the Plant


controls include product reconfigurations, applying suggested firewall rules, or installing signatures that recognise and block malware.


Unidirectional security gateways Meanwhile Waterfall Security Solutions and software and security technology company OPSWAT have announced a joint solution for protecting unidirectionally-protected critical industrial infrastructures. Waterfall’s hardware-enforced Unidirectional


Security Gateways safely and securely integrate industrial networks with corporate networks. OPSWAT’s Metascan server technology enables scanning of files with up to 30 antivirus engines simultaneously. Together, Waterfall’s Unidirectional Gateways are able to scan data using OPSWAT’s Metascan engine before the data is transferred through the gateway system. The joint solution can be used to ensure that data entering critical networks or corporate networks is free of malware.


Easing the compliance process Siemens also offers assistance in the cyber security compliance process. Its in-house cyber emergency response team (CERT) can help customers achieve NERC critical infrastructure protection (CIP) compliance.


The company’s on-site cyber security and NERC CIP assessments are designed to help identify any existing security vulnerabilities in control systems, related IT infrastructures and beyond. Together with its cyber security alliance partners,


Siemens provides comprehensive security audits to assess compliance with NERC CIP-002 through to CIP- 009. Such assessments are conducted by Siemens’ own cyber security experts and, as needed, with experts from its alliance partners. The process includes evaluating current control


systems, and related cyber systems to assess whether they meet the controls relevant CIP-005, 007 and 009 sections. These sections also can be addressed separately from the overall assessment. According to Invensys, now part of Schneider


Electric, many process industries are facing cyber security challenges driven by internal requirements, industry standards, or government regulations. Its solutions cover life cycle methodology, cyber security network management, security best practices, and secure data acquisition (Fig. 1). To this end the company has published a raft of


online best practices datasheets that cover topics such as: industry-agnostic best practices, success stories from different industries, the top five cyber myths for industry, detailed description of onsite security assessments, and the role of managed security services. ■


SWISSMADE


For more information ✔ at www.engineerlive.com/epe


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58