ptarzh-CNenfrdeitjarues

Digital transformation is urgent for industries to survive

Rate this item
(0 votes)
Wednesday, April 22 2020 21: 38

Remote Management and Monitoring (ICS-SOC) and Secure Remote Access (ICS.SecureRemoteAccess) are pillars to ensure business continuity during and after the pandemic.

Remote ICS SOC

The exponential increase in the number of cases of people infected with the new coronavirus meant that companies had to act quickly to protect the well-being of employees and reduce the risk of interruptions in operations.

According to a survey by the Instituto de Economia da Getúlio Vargas Foundation (FGV Iibre), industries are willing to invest more in automation now. In addition, those who previously rejected remote work are realizing that it is possible and necessary to operate on this system. Apart from administrative areas, parts of the production process in industries can also be carried out remotely. In many industrial plants, the operation of priority systems such as supervision and control, equipment support and support services has remote access capability. In this scenario of rapid digital transformation, cybersecurity plays a key role.

As Marcelo Branquinho, CEO of TI Safe, explains, remote access - essential to ensure business continuity in this pandemic moment - if done without due care, it exposes the Information Technology (IT) and Automation Technology (TA) networks ) of companies to the risks of cyber invasion. “It is essential to provide a secure communication structure that includes all parties involved: company, customers, partners and suppliers. And to guarantee business continuity and mitigate future impacts, two pillars are essential: remote monitoring and secure access ”, he details.

O TI Safe ICS-SOC works focused on the pillar of continuous monitoring of cyber security solutions that protect the control systems and industrial networks of companies. The TI Safe monitoring center incorporates data obtained from the continuous monitoring of endpoints (PCs, laptops, mobile devices and servers) as well as shop floor data, automation networks, cyber security solutions and other sources of information. “By correlating this data, our security analysts can choose to use the security event monitoring system to investigate a specific event, check for suspicious activity that characterizes it as a security incident, and even respond to the incident immediately. , mitigating the harmful effects on the availability of the automation network ”, explains the CEO of TI Safe. The executive also explains that the incorporation of threat intelligence, assets, identities and other contextual information contributes to an effective security management and monitoring solution that assists ICS-SOC professionals during the investigative process.

In order to meet the second requirement that ensures business continuity in a non-face-to-face and secure manner, TI Safe has developed a solution based on Thales STA technology (Safenet Trusted Access). TI Safe ICS.SecureRemoteAccess allows the user to have a second authentication factor and ensures connection security. “Using a double authentication factor to reduce the risk of improper access is crucial in the remote operation of an industrial plant. With two-factor authentication configured, users will need, in addition to the user name and password, an access code ”, explains Marcelo Branquinho.

The TI Safe ICS.SecureRemoteAccess solution is managed and monitored 24x7 by the ICS-SOC team and is implemented without the need to visit the plant or the customer's control center. TI Safe ICS.SecureRemoteAccess is sold according to the number of users who will make a secure remote connection, always in multiples of 10, with a minimum of 50 users. The installation can be done in a maximum of two days, including tests and necessary integrations.

For more information contact

Lido 616 times Last modified on Friday, 24 April 2020 18: 21

Copyright © 2007-2020 - IT Safe Information Security - All rights reserved.