View
Sorting
From A to Z
Products found: 3
PENTA SECURITY Smart Factory Security
После анонса «Индустрии 4.0» «умные фабрики» стали важной темой в эпоху Интернета вещей (IoT). Для разработки Smart Factory требуются десятки тысяч датчиков, и необходимо отслеживать местонахождение деталей в режиме реального времени, собирая и анализируя данные, прежде чем переходить к процессу автоматизации.
Сложные и точные промышленные системы управления остаются уязвимыми для злонамеренных атак хакеров. Неисправности некоторых частей оборудования могут поставить под угрозу безопасность и качество продукции. Они могут даже привести к серьезным травмам и повреждению имущества. Чтобы решить эту проблему, была создана организация для реагирования на угрозы безопасности Smart Factory. В 2008 году в США и Корее была организована группа Smart Factory, которая занималась вопросами безопасности.
В Penta Security мы обладаем обширными ссылками на системы безопасности и опытом в области безопасности Smart Factory, например, AMI (Advanced Metering Infrastructure). Компании, желающие внедрить Smart Factories, обязаны аутентифицировать и защищать связь между своими системами, обеспечивая при этом безопасность своих серверов и инфраструктуры, чтобы предотвратить травмы и поддерживать качество обработки.
Пример 1. Решение по мониторингу швейных машин
Швейные компании могут развернуть решение для мониторинга IoT для швейных машин, когда сетевые швейные машины отправляют данные на централизованный облачный сервер. Это может означать значительную экономию для оператора, так как время изготовления машин может контролироваться очень близко и из удаленного места. Однако это также позволяет проводить удаленные атаки, которые могут уничтожить любую экономию (и даже больше) за считанные секунды.
Швейная компания пришла к нам для обеспечения безопасности на своей фабрике. Penta Security сообщила, что для начала необходима безопасность для связи между сетью швейных машин и сервером мониторинга.
- Обеспечение аутентификации устройства для каждой промышленной швейной машины
- Зашифрованный обмен данными между швейными машинами и облачным сервером, а также друг с другом
- Обеспечение целостность данных, передаваемых на сервер мониторинга
-
-
ROI-
-
4
12
Penta Security Smart Factory Security
After the announcement of “Industry 4.0,” ‘Smart Factories’ has emerged as an important topic in the IoT era. To develop a Smart Factory, tens of thousands of sensors are required and it is necessary to track down the location of parts in real-time while collecting and analyzing data before proceeding to the automation process.
Complex and precise industrial management systems remain vulnerable to malicious attacks by hackers. Malfunctions of certain facility parts can compromise the safety and quality of products. They can even lead to severe personal injuries and property damage. To solve this problem, an organization was established to respond to Smart Factory security threats. In 2008 in the U.S. and Korea, the Smart Factory Group was organized to deal with security issues.
At Penta Security, we have extensive security system references and expertise in Smart Factory security such as AMI (Advanced Metering Infrastructure). Companies looking to introduce Smart Factories are required to authenticate and protect communication between their systems while ensuring the security of their servers and infrastructure in order to prevent personal injuries and maintain processing quality.
Case 1. Sewing Machine Monitoring Solution
Sewing companies can deploy an IoT monitoring solution for sewing machines, with networked sewing machines sending data to a centralized cloud server. This can mean significant savings to the operator since the manufacturing times of the machines can be controlled much closely and from a remote location. However, this also allows for remote attacks that can wipe out any savings (and more) in a matter of seconds.
A sewing company came to us for security in their factory. Penta Security advised that, for starters, security was needed for communication between the network of sewing machines and the monitoring server.
- Provide device authentication for each industrial sewing machine
- Encrypted communications of data between sewing machines and cloud server, as well as with each other
- Ensure data integrity of the information being sent to the monitoring server
-
-
ROI-
-
5
18
WAPPLES Web Application Firewall (WAF)
Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.
Besides blocking basic web attacks, WAPPLES is deployed to effectively guard against sensitive data leakage, block malicious web access and prevent website defacement in this era of intensified attacks.
Powered by an intelligent detection engine, WAPPLES is capable of combating the newest threats, including attacks often utilized in Advanced Persistent Threats (APT) launched by malicious agents to obtain data assets of governments and enterprises or for terrorism or political gains.
While traditional WAFs depend on high-maintenance signature updates for low-accuracy pattern-matching, WAPPLES uses a logic-based detection engine called COCEP (Contents Classification and Evaluation Processing).
Utilizing 28 pre-configured detection rules, modified and even unknown attacks are categorized and blocked heuristically and semantically. This proprietary technology allows WAPPLES to deliver superior security with industry-leading accuracy and low false positive rates under various network environments. Maintaining high stability and performance, WAPPLES’ ease of deployment and low operational workload was recognized by Gartner as what made the WAF a popular choice for surveyed clients.
WAF comparison
Through the analysis of an attack’s characteristics, WAPPLES is able to identify attacks that utilize new patterns of exploit that often bypass typical WAFs utilizing signature-based detection engines.
1st and 2nd generation WAFs that operate on blacklists and whitelists lag behind due to their reliance on signature updates to detect the latest threats. In comparison, the sophistication of security that WAPPLES can provide greatly surpasses that of signature-based WAFs.
WAPPLES Product Family and Related Services
- WAPPLES (Appliance-type WAF product)
- WAPPLES SA (Virtual WAF optimized for cloud environment)
- Cloudbric (Cloud-based web security service)
- Cloudbric Business Edition (Web security delivered from Cloudbric or Partner infrastructure)
- Logic-analysis based COCEP™ engine protects websites against OWASP Top 10 risks
- Extremely low false positive rates through heuristic and semantic traffic analysis
- Utilizes 28 detection rules that can be fine-tuned to create robust custom security policies
- Defense from known, zero-day, and HTTP DDoS attacks
- Validity testing (Luhn: ISO/IEC7812) prevents leakage of sensitive data
- High Performance and Stability
- High processing power with in-memory computing capability
- Stable performance even with strict security policy settings enabled
- Increased bandwidth through bonding technology
- Easy to Install & Configure
- Quick setup with preconfigured security policies
- Statistics visualized on centralized dashboard
- Intuitive and easy-to-use GUI management console
- Increases efficiency in web security management
- Can be deployed in Reverse proxy, Inline, or High Availability (HA) configuration modes
- Support for EtherChannel and Multi-Segment
- Integration with SIEM (Micro Focus ArcSight, Splunk)
- Pre-inspection
- WAPPLES installation
- WAPPLES configuration
- Operation testing and demonstration
- Detection log analysis
- Analysis report
- Policy modification
-
-
ROI-
-
19
10