Cyber-Security System

Cyber-Security System

Malicious attacks on industrial systems – including industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA) – have increased significantly in recent years. The Stuxnet and BlackEnergy attacks demonstrates how, one infected USB drive or single spear-phishing email is all it takes for attackers to bridge the air gap and penetrate an isolated network. As cyber attackers grow more insidious in their efforts targeting critical infrastructure, cyber security systems have to evolve faster, providing sophisticated solutions to stay ahead of threats that may be underway. Choosing the right advisor and technology partner to secure your systems has never been more important.

Industrial Cyber Security

Many IT security strategies are focused on data protection and rely on the ‘C-I-A’ model (Confidentiality, Integrity and Availability), prioritizing confidentiality above all else. However, protection is not about ‘data’, but ‘process’. In DNR Process Solutions, we focus on the ‘A-I-C’ model (Availability, Integrity and Confidentiality) as we believe that the confidentiality and integrity of data can be protected if we limit its availability. This is what distinguishes industrial cybersecurity needs, and this is what sets us apart.

DNR Industrial Cyber Security Solution

DNR Process Solutions only partners with the best technology partners on industrial cyber security. DNR’s Industrial Cyber Security Solution is a portfolio of technologies and services designed to secure every industrial layer, including SCADA servers, HMI panels, engineering workstations, PLCs, network connections and people – without impacting on operational continuity and consistency of the technological process. Providing visibility and security to industrial networks is much more than the implementation of IT tools and practices. In order to provide a complete ICS, the complexities involving ICS requirements must be addressed.

Safety and Reliability

Many industrial systems operate 24/7/365 and involve processes with significant safety risks. Network interruptions or system failures may negatively impact people and businesses. Cybersecurity tools that utilize active polling can cause industrial devices to fail, or introduce latency, which can also disrupt the industrial process.

Our solution poses no risk to safety and reliability.

  • It is 100% passive

  • It observes network traffic via a SPAN or mirror port

Industrial Protocols

ICS uses many different protocols that may be unacquainted to the IT specialization, making it inherently insecure. Analyzing communications for security threats, using these diverse protocols, requires specialized evaluation techniques at very detailed levels.

Our solution supports dozens of industrial protocols.

  • It has extensive understanding of industrial protocols

  • easily extends to proprietary protocols via a Protocol SDK

FOR NODES

  • Software and Hardware Integrity Control
  • Application start-up and privilege Control
  • Device Control
  • Host-based firewall and network attack blocker
  • Advance Anti-malware protection
  • Trusted updates
  • Vulnerability Assessment
  • Centralized deployment, management and control

FOR NETWORKS

  • Deep packet inspection (DPI) and protocol analysis
  • Real-time process analytics engine
  • Network integrity and asset visibility forensic tools
  • OTThreatFeed® - Actionable threat remediation insights

TECHNOLOGIES

  • Anti Malware
  • Machine Learning
  • Interoperability
  • Forensic Tools
  • Centralized Management
  • Integrity Control
  • Deep Packet Inspection (DPI)
  • Anomaly Detection

SERVICES

  • Cyber Security Assessment
  • Vulnerability Assessment & Penetration Testing (VAPT)
  • Awareness program
  • Solution Integration