- January 30, 2020
- Products
Summary
Industrial router with firewall
The Lock 150 can be installed in fewer than five minutes without the need for software installations, network configurations, or special IT skills. It has the capacity for up to 10 concurrent VPN connections. Integrated Wi-Fi is an alternate connectivity method and doubles as a wireless device access point. The router is compatible with all existing company products and includes end-to-end encryption between the company’s devices.
Tosibox
www.tosibox.com/product/lock-150
Industrial asset monitoring, risk assessment
In this integrated solution, iSID’s asset inventory now incorporates the asset information stored in the Asset Guardian database, including detailed asset information that is not available from traffic monitoring. This detailed information, such as logic version, ownership, and geolocation, produces a more granular risk score calculated by iSID for each asset. Changes to assets, such as new firmware or PLC logic, are detected on the network in real-time by iSID and sent to Asset Guardian for verification, authorization, and validation against the “golden image” of the binary stored in its database.
Radiflow
https://radiflow.com
Industrial network cyber defense
A new hardware/software joint offering helps utilities, oil and gas facilities, and other industrial manufacturing sites to identify and defend against cyberattacks. The solution is a joint venture between Ixia, a Keysight Technologies business, and Nozomi Networks. The Ixia Vision network packet broker (NPB) collects data from all locations connected to an operational network and delivers it to Nozomi Networks Guardian for real-time processing and analysis.
Aggregating traffic removes duplicate packets and unwanted traffic to improve performance and visibility into critical systems and processes to secure connected operational environments. The joint solution can also be integrated with security information and event management, as well as other systems, to establish an automated threat response. In addition, the NPBs integrate with tools such as firewalls to improve policy enforcement and mitigate unwanted traffic.
Nozomi Networks
www.nozominetworks.com
Modbus-filtering firewall
Sequi
https://sequi.com/portbloque-e
Reader Feedback
We want to hear from you! Please send us your comments and questions about this topic to InTechmagazine@isa.org.