Ürünlerimiz ve çözümlerimiz hakkında daha fazla bilgi, çevrimiçi sunumlar, demolar ve PoC talepleri için bizimle iletişime geçin.

Contact us for more information about our products and solutions, online presentations, demos and PoC requests.

Gallery

İletişim / Contact

İçerenköy Mah. Umut Sok. Quick Tower, Kozyatağı – İstanbul / Türkiye

hello@cerrus.io

+90 216 999 1394

Cyber Security

OT Cyber Security: Why? How?

Cyber-attacks threaten the reliability of business operations such as energy, production, supply chain, etc. and pose a significant risk to every company’s core business.

The widespread adoption of digital technologies has helped companies increase efficiency and sustainability and reduce costs. Yet, increased connectivity makes it increasingly likely that companies are exposed to cyber-attacks on their critical infrastructure.

 

 

 

  • There are more than 30,000 reported cyber-attacks a year, with more and more occurring every year.
  • Every day more than 20,000 new malware samples are developed for use in new attacks.
  • With automation technologies and the Internet of Things, the number of devices and sensors connected to various networks is growing rapidly.
  • With automation technologies and the Internet of Things, the number of devices and sensors connected to various networks is growing rapidly.
  • Cyber Security Awareness and Readiness is an important topic for organizations.

 

 

The traditional OT security model is based on an isolated perimeter that creates a physical barrier to the outside world. This approach is not foolproof or sustainable long term due to the growing need for remote access and connectivity from USB devices, wireless access points and the increasing need for remote access and connectivity. Between security patches that need to be applied, isolated systems remain vulnerable to new attacks and an isolated environment may not prevent attacks from spreading.

Typical Industrial Networks and Components are Vulnerable​

  • Domain-specific technologies: Many technologies require specialized knowledge of industrial control systems technology and communications. Enterprise IT security technologies are not aware of OT.
  • Communication: They can communicate with special protocols that are prone to special attacks
  • Operational Technology shortcomings: PLCs and RTUs are low CPU computers made to control physical components such as valves, pumps, motors, etc. They therefore suffer from resource exhaustion.
    • Lack of authentication
    • Lack of encryption
    • Backdoors
    • Buffer Overflow
    • Specific attacks on physical control components

 

Cyber Security Incidents are Costly…

…Financial, production impact, reputation and trust losses.

So How to Secure OT Environments?

It is possible to eliminate and reduce current and future vulnerabilities in industrial automation and control systems with infrastructure and processes that comply with the ISA/IEC 62443 standard.

To start with;

  • With an integrated IT/OT/IoT Asset Inventory, operational asset information should be collected, made visible and tracked in real time.
  • Cyber Threats / Risks and Transaction Anomalies must be detected quickly
  • Distributed networks and sites should be monitored in a centralized environment.

Along with the basic OT Security needs above, our security framework as an institution should be established with Defense-in-depth and strengthened with continuous process monitoring.

 

As Cerrus, we help our customers to be ready for possible cyber attacks with our OT Cyber Security solutions.

Visualize Your Network, Map Your Assets and Risks

With Nozomi Networks Guardian, we make your OT assets and processes visible.

We provide cyber security vulnerability and risk rating and monitoring of your network, generate real-time alarms in case of security or operational anomalies, and support taking necessary actions by effortlessly integrating with other cyber security products such as SIEM, NAC, FW, etc. if desired. With our Threat Intelligence service, we automatically update the current attacks as YARA, STIX rules as Nozomi Networks Labs and reduce your probability of encountering these attacks. We ensure the protection of your OT network with automatic or personalized rules and alarms.

Secure your network from end-to-end cyberattacks with Fortinet Security Fabric

The Fortinet Security Fabric platform provides true integration and automation across an organization’s security infrastructure, delivering unparalleled protection and visibility into every network segment, device and application – virtual, in the cloud or on-premises.

We also help you strengthen the overall cybersecurity of your network with our Fortinet solutions.

Read more here: hello@cerrus.io

https://www.cerrus.io