North America

+1 866 442 0565

Asia

+632 886 04215

OPERATIONAL TECHNOLOGY

Supervisory Control & Data Acquisition

SUPERVISORY CONTROL & DATA ACQUISITION

SUPERVISORY CONTROL & DATA ACQUISITION

SCADA Systems are inherently risky and lack back Security Controls. These networks, just like any other network, are under threat from cyber-attacks that could bring down any part of the business quickly and with dire operational and financial consequences. It is imperative that businesses and organizations implement robust security measures to protect their networks and the business that would be affected by disruptions caused by internal or external attacks.

SCADA TOP THREATS

Default Configuration
SCADA Systems comes configured with Out-of-box default or simple passwords and a baseline configuration that makes it easier for attackers to quickly compromise the system.

Legacy Software
SCADA Systems run on legacy software that typically lacks sufficient user and system authentication and data authenticity verification, rendering the system more vulnerable for attackers to gain access and control of the system.

Remote Access Policies
SCADA Systems field equipment can typically be connected to invalidated cellular networks or legacy dial-up lines or remote-access servers give attackers easy backdoor access to the OT networks as well as the corporate LAN.

Silos, Policies & Procedures
Security gaps are created when IT, Facility and OT departments do not agree on their strategy and approach to secure industrial, building and OT networks. A unified security policy needs to be developed and adopted to protect both IT and OT technologies.

DDoS Attacks
SCADA Systems’ inherent limited access-controls allow and lack fo security allowing attackers to easily execute DoS attacks on vulnerable impacted systems.

X10 Solution
Deliver SCADA connectivity for data collection anywhere on the network regardless of existing infrastructure or IP scheme. This may involve micro-segmentation with tunnelling and encryption.

Provide secure and controlled access to network resources via user access control and port security.

Simplify network deployment and management with overlay networks or by utilizing existing infrastructure.

DOWNLOAD CENTER

Download Our Brochures