Videc IRMA
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

High costs

Values

Reduce Costs

Ensure Security and Business Continuity

Videc IRMA

Holistic protection from cyber-attacks in your production plants.

Description

With IRMA® (Industry Risk Management Automisation), you can fall back on an effective industrial computer system that can be used to quickly identify and fight off cyberattacks. Without carrying out any kind of activity in your IT network, IRMA® constantly monitors your production plants, provides information on cyber attacks, and enables risk-based analysis, as well as an intelligent alarm system via a clearly-organized management console. This means that risks can be evaluated in good time and actions to stop an attack or to effectively mitigate its consequences can be initiated without hesitation. The particular highlight: from the current version, 18.06, the IT-SiG Sicherheitsstandard (B3S) Wasser / Abwasser [IT Security Act safety standard (B3S) for the water/wastewater sector] from the DVGW [German Technical and Scientific Association for Gas and Water] and the DWA [German Association for Water, Wastewater and Waste] (W1060/M1060) is integrated into the IRMA® security appliance. IRMA® was developed as an innovative, state-of-the-art IT solution and thus guarantees your ability to act in the event of a cyber attack. FUNCTIONS:
  • Cognitive anomaly recognition & immediate IT visualization.
  • Constant monitoring with a passive approach.
  • Swift usage – simple operability.
  • Integration of IT-SiG Sicherheitsstandard Wasser / Abwasser ­(W1060/M1060).
ADVANTAGES:
  • Optimal IT security state of the art.
  • Immediate recognition of anomalies in the IT network.
  • Passive automated monitoring.
  • Safeguarding of systems that cannot be patched e.g. Windows NT/2000/XP, old PLCs, OPC Classic.
  • Safeguarding of certified production plants and processes without re-certification (e.g. for the pharmaceutical, chemical or food sectors).
  • Immediately ready for use thanks to its simple installation and manufacturer-independent concept.
  • Complete oversight and security for your IT systems, network connections, and data connections.
  • Integrated alarm management for cybersecurity incidents.
  • In real-time constant monitoring, recognition of attacks and reporting.
  • Methodical tool for targeted risk analysis, as well as support in firewall parameterization.

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company