IT in Manufacturing


Moxa’s industrial cybersecurity solutions

May 2020 IT in Manufacturing

Industrial networks today are no longer air-gapped and immune from cybersecurity threats. Although deploying a firewall and segmenting networks is a good first step, how are OT engineers, who primarily work with industrial protocols and may lack sufficient IT security expertise, supposed to prevent cybersecurity threats from infecting and spreading across networks? After all, the cybersecurity landscape is constantly changing and goes far beyond blocking the spread of worms or unauthorised PLC commands.

Moxa’s industrial cybersecurity solution is specifically designed to secure industrial networks from both an OT and IT perspective to better address the surging market demand for a comprehensive cybersecurity solution for industrial networks. The solution includes critical IT cybersecurity technologies such as an intrusion prevention system (IPS), a key component for defence-in-depth strategies, which has been specifically tailored to protect OT networks from cyber threats without disrupting industrial operations.

How Moxa’s industrial IPS works

Moxa’s industrial IPS features OT-centric deep packet inspection technology, enhances IT network security visibility, and ultimately helps mitigate risks and protects industrial networks from security threats. Deep packet inspection can identify multiple industrial protocols and allow or block specific functions, such as read or write access. Based on the identified protocol, the industrial IPS can then prevent any unauthorised protocols or functions. This way, users can be more confident that the traffic on their industrial networks is trusted and non-malicious. In addition, Moxa’s industrial IPS provides virtual patching of vulnerabilities for operating systems, application software, and industrial equipment such as PLCs. By effectively integrating OT and IT technologies, Moxa’s industrial IPS safeguards critical assets from the latest cybersecurity threats.

In order to ensure that network activity on industrial networks is authorised, Moxa’s industrial cybersecurity solution allows users to define granular access controls at different levels. They can define a whitelist of devices and IP ports that are allowed to access all or part of their entire

network. In addition, they can also define the authorised protocol format to prevent unauthorised commands from passing through the industrial IPS or firewalls. Furthermore, OT engineers can even define which control commands can pass through the network to reduce human error associated with sending a wrong control command. Whitelisting control significantly reduces the likelihood of a DoS attack by OT Trojans.

How to mitigate cyber risks while maintaining system availability

Risk 1: even though a north-south bound firewall has been implemented, unauthorised network access through third parties may still happen. Most serial data communication (proprietary protocols) are not encrypted, leaving the communication unsecured and open to exploitation

Risk 2: if users do not have a full understanding of their industrial network status, they may not be able to respond quickly or effectively.

Risk 3: leaving unused service ports open may lead to a DoS attack.

Risk 4: unauthorised devices may implant malware into the HMI which then spreads across the network.

Risk 5: most serial data communication protocols are not encrypted, leaving the communication unsecured and open to exploitation.

Risk 6: security patches are not available or feasible for PLCs.

Mitigating such vulnerabilities to secure industrial networks is Moxa’s first priority

IEC-G102-BP series (industrial IPS/IDS)

• Hummingbird-sized industrial security box with IPS/IDS.

• Fine-grained policy enforcement with whitelisting control.

• Bump-in-the-wire installation without impacting the network.

IEF-G9010 series (industrial firewall)

• Compact, security-hardened, and rugged design.

• Fine-grained layer 2 to layer 7 firewall policy with IPS capability.

• Industrial NAT and network segmentation.

Security dashboard console (security management software)

• Centralised cybersecurity management with real-time dashboards.

• OT visibility including device identification and network traffic analyser.

• Automatically deploy virtual patches without disrupting operations.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Unlocking mining efficiency with advanced processing control
IT in Manufacturing
ABB’s Advanced Process Control system, powered by its Expert Optimizer platform, is emerging as a key enabler of smarter, more efficient mining operations.

Read more...
Open control technology reduces energy consumption and carbon footprint.
Beckhoff Automation IT in Manufacturing
The Swedish company Airwatergreen AB is breaking new ground in the dehumidification of air in industrial buildings and warehouses. PC-based control from Beckhoff regulates the innovative process.

Read more...
Harnessing AI and satellite imagery to estimate water levels in dams
IT in Manufacturing
Farmers and water managers often struggle to accurately estimate and monitor the available water in dams. To address the challenge, International Water Management Institute researchers have worked with Digital Earth Africa to create an innovation that uses satellite images and AI to get timely and accurate dam volume measurements.

Read more...
Why industry should enter the world of operator training simulators
Schneider Electric South Africa IT in Manufacturing
System-agnostic operator training simulator (OTS) software is a somewhat unsung hero of industry that trains plant operators in a virtual world that mirrors real-world operations. The benefits are multiple.

Read more...
Track busway for scalable data centre power delivery
IT in Manufacturing
The latest generation Legrand Data Centre Track Busway technology addresses the operational pressures facing today’s high-density, AI-intensive computing environments and is being well received by data centre facilities around the world.

Read more...
Poor heat management in data centre design
IT in Manufacturing
Designing a world-class data centre goes beyond simply keeping servers on during load shedding; it is about ensuring they run efficiently, reliably, and within the precise environmental conditions they were built and designed for.

Read more...
Time-sensitive networking
RJ Connect Editor's Choice Fieldbus & Industrial Networking
In this article, we will explore what is driving the rise of time-sensitive networking, how it is reshaping industrial efficiency, the challenges when deploying this technology, and ways to tackle these challenges.

Read more...
It’s time to fight AI with AI in the battle for cyber resilience
IT in Manufacturing
Cybercrime is evolving rapidly, and the nature of cyber threats has shifted dramatically. Attacks are now increasingly powered by AI, accelerating their speed, scale and sophistication. Cybersecurity needs to become part of business-critical strategy, powered by AI to match attackers’ speed with smarter, faster and more adaptive defences.

Read more...
Why AI sustainability must be a boardroom priority
IT in Manufacturing
As South African companies race to harness artificial intelligence for innovation and growth, few are asking the most critical question - the environmental cost.

Read more...
RS South Africa shines spotlight on MRO procurement
RS South Africa IT in Manufacturing
RS South Africa has highlighted the growing pressures faced by procurement professionals responsible for maintenance, repair and operations supplies across the country’s vital economic sectors.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved