IT in Manufacturing


Moxa’s industrial cybersecurity solutions

May 2020 IT in Manufacturing

Industrial networks today are no longer air-gapped and immune from cybersecurity threats. Although deploying a firewall and segmenting networks is a good first step, how are OT engineers, who primarily work with industrial protocols and may lack sufficient IT security expertise, supposed to prevent cybersecurity threats from infecting and spreading across networks? After all, the cybersecurity landscape is constantly changing and goes far beyond blocking the spread of worms or unauthorised PLC commands.

Moxa’s industrial cybersecurity solution is specifically designed to secure industrial networks from both an OT and IT perspective to better address the surging market demand for a comprehensive cybersecurity solution for industrial networks. The solution includes critical IT cybersecurity technologies such as an intrusion prevention system (IPS), a key component for defence-in-depth strategies, which has been specifically tailored to protect OT networks from cyber threats without disrupting industrial operations.

How Moxa’s industrial IPS works

Moxa’s industrial IPS features OT-centric deep packet inspection technology, enhances IT network security visibility, and ultimately helps mitigate risks and protects industrial networks from security threats. Deep packet inspection can identify multiple industrial protocols and allow or block specific functions, such as read or write access. Based on the identified protocol, the industrial IPS can then prevent any unauthorised protocols or functions. This way, users can be more confident that the traffic on their industrial networks is trusted and non-malicious. In addition, Moxa’s industrial IPS provides virtual patching of vulnerabilities for operating systems, application software, and industrial equipment such as PLCs. By effectively integrating OT and IT technologies, Moxa’s industrial IPS safeguards critical assets from the latest cybersecurity threats.

In order to ensure that network activity on industrial networks is authorised, Moxa’s industrial cybersecurity solution allows users to define granular access controls at different levels. They can define a whitelist of devices and IP ports that are allowed to access all or part of their entire

network. In addition, they can also define the authorised protocol format to prevent unauthorised commands from passing through the industrial IPS or firewalls. Furthermore, OT engineers can even define which control commands can pass through the network to reduce human error associated with sending a wrong control command. Whitelisting control significantly reduces the likelihood of a DoS attack by OT Trojans.

How to mitigate cyber risks while maintaining system availability

Risk 1: even though a north-south bound firewall has been implemented, unauthorised network access through third parties may still happen. Most serial data communication (proprietary protocols) are not encrypted, leaving the communication unsecured and open to exploitation

Risk 2: if users do not have a full understanding of their industrial network status, they may not be able to respond quickly or effectively.

Risk 3: leaving unused service ports open may lead to a DoS attack.

Risk 4: unauthorised devices may implant malware into the HMI which then spreads across the network.

Risk 5: most serial data communication protocols are not encrypted, leaving the communication unsecured and open to exploitation.

Risk 6: security patches are not available or feasible for PLCs.

Mitigating such vulnerabilities to secure industrial networks is Moxa’s first priority

IEC-G102-BP series (industrial IPS/IDS)

• Hummingbird-sized industrial security box with IPS/IDS.

• Fine-grained policy enforcement with whitelisting control.

• Bump-in-the-wire installation without impacting the network.

IEF-G9010 series (industrial firewall)

• Compact, security-hardened, and rugged design.

• Fine-grained layer 2 to layer 7 firewall policy with IPS capability.

• Industrial NAT and network segmentation.

Security dashboard console (security management software)

• Centralised cybersecurity management with real-time dashboards.

• OT visibility including device identification and network traffic analyser.

• Automatically deploy virtual patches without disrupting operations.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
Protecting industrial networks with resilient defence
RJ Connect IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...
Bombardier expands adoption of Siemens Xcelerator for aircraft developmen
Siemens South Africa IT in Manufacturing
Bombardier has expanded its adoption of the Siemens Xcelerator portfolio of industry software for aircraft development.

Read more...
The DeepSeek effect: navigating AI’s new frontier
IT in Manufacturing
DeepSeek has emerged as a game-changer in artificial intelligence, offering a robust platform redefining how businesses approach AI integration. This change is especially important since it opens up AI to a wider range of organisations, including small and medium-sized enterprises that could have previously been priced out of the market.

Read more...