A complete set to handle cyber security of industrial system

What kind of risk for cyber security and what solutions for digital factories ?

 

All the interconnections added with the new Industry 4.0 technologies are great opportunities to increase the efficiency and the agility of production systems but they also add new risks. The discovery of Stuxnet, a computer worm designed to attack industrial programmable logic controllers (PLCs), in 2010 was the first event that showed the vulnerability of SCADA systems and PLCs. More and more attacks on industrial systems have been reported since then. Today any project in any factory has to handle cyber security in the most serious way.

 

Creative IT offers a complete set of hardware and services to handle the cyber security of industrial systems.

  • Cyber security policies

  • Network security solutions

  • On site test

Cyber security policies

 

During our industrial project, Creative IT with its partner specialized in cyber security will help you define the right policies.

How to define the right network partitioning?

How to secure connections between industrial networks and enterprise networks?

How to give access to remote partners without compromising security policies?

All these subjects have to be addressed early in the project in order to include security in the design of the solution.

Network security solutions

Watch the video of Qubes i4 solution for a safe & secure information system bertween factories and central database or datacenter

Creative IT has selected Stormshield as a key partner for cyber security hardware and software. With technologies that have been certified at the highest level in Europe (EU RESTRICTED, NATO RESTRICTED, and ANSSI EAL4+), Stormshield is a reference in cyber security. Stormshield Network Security solutions are built upon the concept of Multi-layer Collaborative Security. The product range includes appliances dedicated to IT network or OT network to secure PLCs and industrial protocols with a large scope of functionalities.

USAGE CONTROL

Firewall/IPS/IDS mode, identity-based firewall, application firewall, Microsoft Services Firewall, detection and control of the use of mobile terminals, vulnerability detection, URL filtering, global/local security policy.

CONFIDENTIALITY

Site-to-site or nomad IPSec VPN, remote SSL VPN, access in multi-OS tunnel mode (Windows, Android,iOS, etc), SSL VPN agent configurable centrally (Windows), Support for Android/iPhone IPSec VPN.

PROTECTION FROM THREATS

Intrusion prevention, protocol scan, application inspection, protection from denial of service attacks(DoS), protection from SQL injections, protection from Cross-Site Scripting (XSS), protection from malicious Web2.0 code and scripts, Trojan detection, detection of interactive connections (botnets, Command&Control), protection from data evasion, Advanced management of fragmentation, automatic quarantining in the event of an attack, Antispam and antiphishing: reputation-based analysis —heuristic engine, embedded antivirus (HTTP, SMTP, POP3, FTP),detection of unknown malware via sandboxing, SSL decryption and inspection, VoIP protection (SIP), collaborative security: adaptation of the filter policy according to security events or detected vulnerabilities.

Certified experts from Creative IT can deploy the hardware and software to guarantee a suited level of protection for the strategic data of even the most sensitive corporations and organizations.

On site testing

 

Once the security policy has been defined and deployed, Creative IT will ensure that the protection is efficient with on-site testing. Real intrusion tests conducted by a specialized partner allow to check that protection is efficient and that the global solution cannot be compromised easily.

Tests sur site Qubes Creative-IT