CONNECT WITH US
TI(com)
Sponsored

IDS/IPS Mitigate Cyber Risks in Industrial Networks

Press release 0

Information security used to pose little threat to industrial machines due to their inability to internet access. However, with the trend of IP communication and Internet of things (IoT), cyber threats intensify, thus making information security controls unignorable issues.

"To mitigate increasing information security risks, many industries start paying attention to information security and installing industry firewalls to secure remote access and intercept suspicious data exchanges," said Hadwin Liu, Chief Architect of NEXCOM Network and Communication Solutions Business Group.

Still, malicious users keep trying ways to disguise malware to bypass firewalls. To patch this, information security products integrate IDS/IPS and use smart control and correlation engine to filter malicious packets. With industrial protocols and behavior-based pattern matching, they can block suspicious connections to industrial networks and endpoint assets.

As protection targets in industrial networks are machinery, network security products should be scattered at exit points of each subdomain for close protection. In case malware-infected machinery in one subdomain tries to infect machinery in other domains, IDS/IPS will drop data packets, cut off connections, and restrict access, containing the infection.

NEXCOM's industry firewalls integrate VPN, firewall, and IDS/IPS. "Our IDS/IPS engine has rich signature database. Through log analysis and SIEM, it detects abnormal programs hiding in normal packets. While industrial machines adopt dynamic IP address, VPN helps headquarters remotely monitor production," said Liu.

Security breach and consequences in industrial networks can be critical. Integrated industry firewalls shield malware and protect endpoint assets at the bottom layer from risks interrupting operation and from hackers stealing intellectual property and confidential data.

For more information about NEXCOM, please visit http://www.nexcom.com/

Protecting endpoint assets at the bottom layer of industrial networks requires integrated defense with VPN, firewalls, and IDS/IPS.

Protecting endpoint assets at the bottom layer of industrial networks requires integrated defense with VPN, firewalls, and IDS/IPS.

DIGITIMES' editorial team was not involved in the creation or production of this content. Companies looking to contribute commercial news or press releases are welcome to contact us.