SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!
Need Help? Email [email protected]
  • LOGIN

E-SPIN Group

CONTACT US / GET A QUOTE
  • No products in cart.
  • HOME
  • PROFILE
    • Corporate Profile
    • About us
    • Customer Overview
    • Investor Relations
    • Procurement
  • GLOBAL THEMES
    • Artificial Intelligence (AI)
    • Big Data
    • Blockchain
    • Cloud Computing
    • Cognitive Computing
    • Cyber Security
    • DevSecOps
    • Digital Transformation (DT)
    • Modern Workplace
    • Internet of Things (IoT)
    • Quantum Computing
  • SOLUTIONS
    • Application Security
    • DevSecOps
    • Digital Forensics
    • IT Operations Management (ITOM)
    • Malware Analysis and Reverse Engineering
    • Network Management System (NMS)
    • Network Operation (NetOps)
    • Network Performance Monitoring and Diagnostics (NPMD)
    • Penetration Testing
    • Secure Development
    • Security Information & Event Management (SIEM)
  • INDUSTRIES
    • Aerospace & Defense
    • Automotive
    • Banking & Financial Markets
    • Chemical & Petroleum
    • Commercial and Professional Services
    • Construction & Real Estate
    • Consumer Products
    • Education
    • Electronics
    • Energy & Utilities
    • Food & Beverage
    • Information Technology
    • Insurance
    • Healthcare
    • Goverment
    • Telecommunications
    • Transportation
    • Travel
    • Manufacturing
    • Media & Entertainment
    • Mining & Natural Resources
    • Life Sciences
    • Retail
  • PRODUCTS
    • Brand Overview
      • Acunetix
      • E-Lock
      • Hex-Rays
      • Immunity
      • Progress | Ipswitch
      • Metageek
      • Qualys
      • Parasoft
      • Tenable
      • Titania
      • Veracode
    • Rest of Brands
      • Adobe
      • BeyondTrust
      • Core Security
      • DefenseCode
      • HCL
      • ImmuniWeb
      • LiveAction
      • McAfee
      • Micro Focus
      • Microsoft
        • Microsoft Surface
      • Netsparker
      • Nutanix
      • Paessler
      • PECB
      • Portswigger
      • Red Hat
      • Riverbed
      • RSA
      • Solarwinds
      • TamoSoft
      • Trend Micro
      • TSFactory
      • Trustwave
      • VMware
      • VanDyke
      • Visiwave
    • Services Overview
    • Line Card
  • e-STORE
    • e-STORE
    • eSTORE Guide
    • SUPPORT
  • CAREERS
    • Careers
    • Culture, Values and CSR
    • How We Hire
    • Job Openings
  • BLOG / NEWS
    • Blogs and News
    • Resources Library
    • Calendar of Events
  • CONTACT
  • Home
  • Industries
  • Chemical and petroleum
  • Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN
Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN
0
E-SPIN
Tuesday, 17 October 2017 / Published in Chemical and petroleum, Energy and utilities, Industries, Manufacturing, Solution

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

Industrial Control System (ICS)/SCADA System is widely adopted in manufacturing, energy and utilities, chemical and petroleum industries for mission critical industrial automation.

For quick key term definition.

  • Operational Technology (OT) refers to computing systems that are used to manage industrial operations as opposed to administrative operations. Operational systems include production line management, mining operations control, oil & gas monitoring etc.
  • Industrial control systems (ICS) is a major segment within the operational technology sector. It comprises systems that are used to monitor and control industrial processes. This could be mine site conveyor belts, oil refinery cracking towers, power consumption on electricity grids or alarms from building information systems. ICSs are typically mission-critical applications with a high-availability requirement.
  • Most ICSs fall into either a continuous process control system, typically managed via programmable logic controllers (PLCs), or discrete process control systems (DPC), that might use a PLC or some other batch process control device.
  • Industrial control systems (ICS) are often managed via a Supervisory Control and Data Acquisition (SCADA) systems that provides a graphical user interface for operators to easily observe the status of a system, receive any alarms indicating out-of-band operation, or to enter system adjustments to manage the process under control.

Typical SCADA Configuration involved Control Unit for two way communication. Display information on SCADA Display Unit and remote instruction on Remote Terminal Unit (RTU) thru LAN/WAN computer network communication link.

E-SPIN hassle free package solution can be divide into two solution group – Availability and Security, or adopted for end to end infrastructure availability and security management.

As you can see from the above typical ICS/SCADA System deployment scenario and context in operation center. Managing thru the consolidated graphic dashboard is essential and immediate notify for various component availability and proactive alerting is important.

E-SPIN may visual construction of the availability monitoring system and dashboard with live status availability on top layer of the graphic display to provide visual and visibility control and management. So the operator will know in exactly which component and sub system got the availability issue and can proactive in managing them.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

How “secure” for the entire ICS/SCADA in term of the any potential vulnerability (likely exploit and exploitable tested), source code 3rd party module/libraries and own source code static application security testing (SAST) to dynamic application security testing (DAST), smartphone and tablet application security testing.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

E-SPIN solution for ICS/SCADA in our “Availability” and “Security” Solution Portfolio:

Entire infrastructure end to end monitoring for availability, proactive alerting

  • system availability
  • unusual traffic and threshold trigger
  • proactive power monitoring
  • link monitoring
  • critical application performance monitoring (APM)
  • virtualized infrastructure monitoring
  • database performance monitoring
  • server and embedded system monitoring
  • centralized dahsboard

Entire infrastructure end to end security vulnerability management, protection

  • network and system vulnerability detection
  • vulnerability exploitable testing
  • static and dynamic application security testing (DAST/SAST)
  • software composition analysis (SCA)
  • wireless infrastructure security (WLAN/AP/Controller)

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

ICS/SCADA System entire infrastructure as “enterprise application” or “mission critical application” that E-SPIN can help to visibility the entire “application” multiple server, component into one unified and customizable application service level agreement (SLA) interactive dashboard. From the dashboard to instant detect application “availability” up time, down time, early warning for sub system performance issue and in specific time what is really happen from application management perspective.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

ICS/SCADA involved significant component for the link communication. E-SPIN may help to visualize those important and critical link beyond just how many traffic packet size, but go depth and further into “traffic analysis” level.  We help to visualize the communication link for both inbound and outbound, and provide visual real time traffic flow in term of what kind of traffic, protocol, source and destination, unusual traffic and critical application whether reserved the bandwidth required or not. It may use for perform security “x-ray” to make sure you know in exactly what pass thru your system. Without those visibility it will difficult for you to manage it in effective and efficient manner.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

For ICS/SCADA system make use of modern infrastructure, cloud and virtualization computing technology. It will be essential you can maintain complete visibility into entire virtualized infrastructure for the exact virtual machine node and host, cpu/memory/interface/disk utilization and link utilization just like physical infrastructure and machine. E-SPIN may help for the “virtualized infrastructure” availability monitoring and integrated into single unified dashboard across entire ICS/SCADA for effective and efficient operation.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

For ICS/SCADA make use of modern infrastructure, wireless visibility is always in concern, since if you can not visualize them, you are not able to manage them effectively. E-SPIN may help to visualize your wireless infrastructure (include your wireless AP and controller). From there you can see how many connected mobile device (whether trusted or unusual device) attached to your wireless infrastructure. From here you can understanding for noise to signal, and whether respective wireless infrastructure is overload or underload, and additional wireless device is required for optimized wireless infrastructure performance.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

For ICS/SCADA Security. Put entire infrastructure and asset into vulnerability assessment and grouping them into respective industry standard for security, risk and compliance benchmark will be easy for managing security risk in the systematic way. For instance, CIP-002 Identification of Critical Cyber Assets Dashboard and Interactive Reporting.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

One of the most important part for the vulnerability management (VM) is to verify and confirm for whether the particular potential vulnerability detected is likely exploitable or just false positive. E-SPIN may help to confirm by import them into world class vulnerability validation, exploitable testing before significant resources assigned for it. On top of it, E-SPIN maintain ICS/SCADA system specific latest attack signature verified and proof by industry specialist for subscriber, so you can access truly relevant ICS/SCADA system vulnerability, attack and latest early alert and warning before public at large.

Industrial Control System (ICS)/SCADA Availability and Security Solution Overview by E-SPIN

How “secure” your ICS/SCADA in term of the source code quality is one of the key aspect for ICS/SCADA Security. E-SPIN may help for entire software development lifecycle (SDLC), whether your adopt traditional development process like waterfall model or modern DevOps, we had the value to offer in term of end to end or partial point solution adoption, such as static application security testing (SAST) your source code, vendor security (if you outsource the application development), 3rd party module/libraries security (if you incorporate 3rd party module/libraries into your project) thru software composition analysis (SCA), smart phone mobile/tablet application security and dynamic application security testing (DAST) your application, secure check and audit while you write your code in IDE environment, and offer various integration and automation  to simplify the SDLC and adapt for the fast cycle time of DevOps, microservices and application containers security practice.

Above present our ICS/SCADA System solution overview. Feel free to contact E-SPIN for various solution/requirement engagement and services.

 

Tagged under: Application component monitoring, Application Life Cycle Management (ALM), Application Security, Availability, Dynamic Application Security Testing (DAST), E-SPIN, Flow Monitor, ICS, Mobile Application, Pentesting, SCADA, security, Solution, Static Application Security Testing (SAST), Virtualization Monitoring, Vulnerability Management, Wireless Performance

What you can read next

Paper and Forest products industry in the digital age
Paper and Forest products industry in the digital age
What is definition and concept of cyber security
What is definition and concept of cyber security
Global Information Assurance Certification (GIAC)
GIAC Certified Project Manager Certification (GCPM)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Why paper planner, notebook and journal still one of modern productivity tool

    Paper planner is symbol of dated work practice?...
  • The future of work after COVID-19

    Let’s get real, despite the vaccine rolli...
  • Retail trends for 2021 and beyond

    After a year long of COVID-19 pandemic, lockdow...
  • AppSec Lab AppUse Pro product discontinued notice

    For all the business partners and customers, Be...
  • Linux dominance DevSecOps

    Whether from the DevOps to modern DevSecOps, Li...

Recent Comments

  • Dorai M on 5 Common ML Challenges Data Scientists Face

Archives

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • March 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • January 2015
  • December 2014
  • October 2014
  • September 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • February 2012
  • July 2011
  • June 2011
  • February 2009
  • July 2008

Categories

  • Acunetix
  • Adobe
  • Aerospace and Defence
  • AppSec Labs
  • Automotive
  • Banking and Financial Markets
  • BeyondTrust
  • Brand
  • Chemical and petroleum
  • Codified Security
  • Commercial and Professional Services
  • Construction and Real Estate
  • Consumer products
  • Contact Us
  • Core Impact
  • Core Security
  • DefenseCode
  • E-Lock
  • Education
  • Electronics
  • Energy and utilities
  • FAQ
  • Food and Beverage (F&B)
  • GFI
  • Global Themes and Feature Topics
  • Government
  • HCL
  • Healthcare
  • Hex-Rays
  • IBM
  • Immunity
  • ImmuniWeb
  • Industries
  • Information Technology
  • Insurance
  • Ipswitch
  • Job
  • Life Science
  • LiveAction
  • Logpoint
  • Manufacturing
  • McAfee
  • Media and Entertainment
  • Metageek
  • Micro Focus
  • Microsoft
  • Mining and Natural Resources
  • Nessus
  • Netsparker
  • News
  • Nutanix
  • Paessler
  • Parasoft
  • PECB
  • PortSwigger
  • Pradeo
  • Product
  • Qualys
  • Rapid7
  • RedHat
  • Retail
  • Retina
  • Riverbed
  • RSA
  • Security Innovation
  • Security Roots
  • Services
  • SILICA
  • Smart City
  • Soft Activity
  • SolarWinds
  • Solution
  • Symantec
  • TamoSoft
  • Telecommunications
  • Tenable
  • Titania
  • Transportation
  • Travel
  • Trend Micro
  • Trustwave
  • TSFactory
  • Uncategorized
  • Vandyke
  • Veracode
  • Videos
  • VisiWave
  • VMware
  • Webinar Archive

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

CORPORATE

  • Profile
  • About us
  • Careers
  • Investor Relations
  • Procurement

SOLUTIONS & PRODUCTS

  • Industries
  • Solutions
  • Products
  • Brand Overview
  • Services

STORE & SUPPORT

  • Shop
  • Cart
  • Checkout
  • My Account
  • Support

PRODUCTS & SERVICES

  • Industries
  • Solutions
  • Products
  • Brand Overview
  • Services

FOLLOW US

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • YouTube
  • WordPress Blog
© 2005 - 2021 E-SPIN Group of Companies | All rights reserved.
  • Contact
  • Privacy
  • Terms of use
TOP