Manufacturing industries are increasingly migrating to smart manufacturing technologies as part of the ongoing fourth industrial revolution. With increased connectivity and advanced automation systems such as manufacturing execution systems (MES) that integrate plant floor production (ICS/SCADA networks) and enterprise resource planning (ERP) systems, manufacturing objectives revolve around maximizing productivity, but at the same time they create new vulnerabilities and risks such as production manipulation, operational downtime and sensitive data-theft threats.
In the last 5 years, manufacturing industries have been the victims of an increased number of cyberattacks, such as the Havex/Dragonfly campaign that targeted industrial control systems across the USA and Europe or the most well-known WannaCry and NotPetya that caused havoc in the automotive, food, pharmaceutical and other manufacturing plants. Events like these result in significant revenue loss valued in the hundreds of millions of dollars, reputation damage, loss of competitive edge and sometimes public and employee’s safety issues.
Manufacturers need to shift from “How can I isolate my production network,” to “How can I secure my network while it is connected?”. SCADAfence provides non-intrusive continuous monitoring of all OT network activities. This enables administrators to respond in real time to events that jeopardize the operational continuously. By detecting malware infection, misconfigurations and device malfunction – IT and OT managers can reduce the likelihood of downtime in critical operational networks.
Connectivity between OT and enterprise systems, such as ERP, network complexity and production automation, and new external connectivity to vendors and IIoT services is changing the way that OT networks operate. Such changes, together with manually generated or outdated asset inventories, create increased blind spots for OT network administrators – or Shadow OT devices. SCADAfence provides a complete, automated asset discovery and inventory that includes mapping of network traffic, bandwidth analysis and critical forensics information.