Industrial Cyber SecurityMany IT security strategies are focused on data protection and rely on the ‘C-I-A’ model (Confidentiality, Integrity and Availability), prioritizing confidentiality above all else. However, protection is not about ‘data’, but ‘process’. In DNR Process Solutions, we focus on the ‘A-I-C’ model (Availability, Integrity and Confidentiality) as we believe that the confidentiality and integrity of data can be protected if we limit its availability. This is what distinguishes industrial cybersecurity needs, and this is what sets us apart.
DNR Industrial Cyber Security SolutionDNR Process Solutions only partners with the best technology partners on industrial cyber security. DNR’s Industrial Cyber Security Solution is a portfolio of technologies and services designed to secure every industrial layer, including SCADA servers, HMI panels, engineering workstations, PLCs, network connections and people – without impacting on operational continuity and consistency of the technological process. Providing visibility and security to industrial networks is much more than the implementation of IT tools and practices. In order to provide a complete ICS, the complexities involving ICS requirements must be addressed.
Safety and ReliabilityMany industrial systems operate 24/7/365 and involve processes with significant safety risks. Network interruptions or system failures may negatively impact people and businesses. Cybersecurity tools that utilize active polling can cause industrial devices to fail, or introduce latency, which can also disrupt the industrial process.
Our solution poses no risk to safety and reliability.
It is 100% passive
It observes network traffic via a SPAN or mirror port
Industrial ProtocolsICS uses many different protocols that may be unacquainted to the IT specialization, making it inherently insecure. Analyzing communications for security threats, using these diverse protocols, requires specialized evaluation techniques at very detailed levels.
Our solution supports dozens of industrial protocols.
It has extensive understanding of industrial protocols
easily extends to proprietary protocols via a Protocol SDK
- Software and Hardware Integrity Control
- Application start-up and privilege Control
- Device Control
- Host-based firewall and network attack blocker
- Advance Anti-malware protection
- Trusted updates
- Vulnerability Assessment
- Centralized deployment, management and control
- Deep packet inspection (DPI) and protocol analysis
- Real-time process analytics engine
- Network integrity and asset visibility forensic tools
- OTThreatFeed® - Actionable threat remediation insights
- Anti Malware
- Machine Learning
- Forensic Tools
- Centralized Management
- Integrity Control
- Deep Packet Inspection (DPI)
- Anomaly Detection
- Cyber Security Assessment
- Vulnerability Assessment & Penetration Testing (VAPT)
- Awareness program
- Solution Integration