Military-grade solution to protect industrial control systems

Organisations will now be able to bring their industrial control systems technology into the modern era and realise the benefits of increased connectivity while also reducing the risk of cyber attack

BAE Systems Detica launched IndustrialProtect, a military-grade solution designed to protect the industrial control systems of organisations such as power plants, oil refineries or automated manufacturing plants from cyber attack, allowing them to both modernise their legacy systems as well as improve their security.

The major applications for the IndustrialProtect solution will be organisations within the Defence, Energy, Utilities and Natural Resources sectors, where industrial control systems are integral to their efficiency, growth and productivity.

The security risks to these organisations can also have “real-world” impacts – affecting not only the safety and ability of the organisation to operate, but also the potential to cause significant economic, human and environmental harm should a security breach incident occur.

IndustrialProtect is launching at a time when operational networks are increasingly vulnerable. The on-going convergence of Operational Technology (OT) and enterprise IT networks is bringing great benefits, such as increased automation, more centralised key functions and better management information. But the convergence also creates greater risk as it increases the opportunity for attack through unauthorised access or espionage and the manipulation of data and data loss caused by both targeted and non-targeted attacks.

IndustrialProtect effectively mitigates these risks by using cutting-edge technology to ensure the security of industrial control systems. It is the only solution that provides all of the necessary security controls in a single appliance, and also delivers unrivalled security enforcement while also enabling greater business efficiency, secure information sharing and connectivity.

Five key features:

  • Implementation of network segmentation without breaking critical business process
  • Prevention of unauthorised systems from exchanging information
  • Assurance that the integrity of information is preserved from source to destination
  • Transparency to existing systems and a very low attack surface
  • Full remote management from the industrial control system and back to the system.
More about

Don't miss