IT in Manufacturing


Moxa’s industrial cybersecurity solutions

May 2020 IT in Manufacturing

Industrial networks today are no longer air-gapped and immune from cybersecurity threats. Although deploying a firewall and segmenting networks is a good first step, how are OT engineers, who primarily work with industrial protocols and may lack sufficient IT security expertise, supposed to prevent cybersecurity threats from infecting and spreading across networks? After all, the cybersecurity landscape is constantly changing and goes far beyond blocking the spread of worms or unauthorised PLC commands.

Moxa’s industrial cybersecurity solution is specifically designed to secure industrial networks from both an OT and IT perspective to better address the surging market demand for a comprehensive cybersecurity solution for industrial networks. The solution includes critical IT cybersecurity technologies such as an intrusion prevention system (IPS), a key component for defence-in-depth strategies, which has been specifically tailored to protect OT networks from cyber threats without disrupting industrial operations.

How Moxa’s industrial IPS works

Moxa’s industrial IPS features OT-centric deep packet inspection technology, enhances IT network security visibility, and ultimately helps mitigate risks and protects industrial networks from security threats. Deep packet inspection can identify multiple industrial protocols and allow or block specific functions, such as read or write access. Based on the identified protocol, the industrial IPS can then prevent any unauthorised protocols or functions. This way, users can be more confident that the traffic on their industrial networks is trusted and non-malicious. In addition, Moxa’s industrial IPS provides virtual patching of vulnerabilities for operating systems, application software, and industrial equipment such as PLCs. By effectively integrating OT and IT technologies, Moxa’s industrial IPS safeguards critical assets from the latest cybersecurity threats.

In order to ensure that network activity on industrial networks is authorised, Moxa’s industrial cybersecurity solution allows users to define granular access controls at different levels. They can define a whitelist of devices and IP ports that are allowed to access all or part of their entire

network. In addition, they can also define the authorised protocol format to prevent unauthorised commands from passing through the industrial IPS or firewalls. Furthermore, OT engineers can even define which control commands can pass through the network to reduce human error associated with sending a wrong control command. Whitelisting control significantly reduces the likelihood of a DoS attack by OT Trojans.

How to mitigate cyber risks while maintaining system availability

Risk 1: even though a north-south bound firewall has been implemented, unauthorised network access through third parties may still happen. Most serial data communication (proprietary protocols) are not encrypted, leaving the communication unsecured and open to exploitation

Risk 2: if users do not have a full understanding of their industrial network status, they may not be able to respond quickly or effectively.

Risk 3: leaving unused service ports open may lead to a DoS attack.

Risk 4: unauthorised devices may implant malware into the HMI which then spreads across the network.

Risk 5: most serial data communication protocols are not encrypted, leaving the communication unsecured and open to exploitation.

Risk 6: security patches are not available or feasible for PLCs.

Mitigating such vulnerabilities to secure industrial networks is Moxa’s first priority

IEC-G102-BP series (industrial IPS/IDS)

• Hummingbird-sized industrial security box with IPS/IDS.

• Fine-grained policy enforcement with whitelisting control.

• Bump-in-the-wire installation without impacting the network.

IEF-G9010 series (industrial firewall)

• Compact, security-hardened, and rugged design.

• Fine-grained layer 2 to layer 7 firewall policy with IPS capability.

• Industrial NAT and network segmentation.

Security dashboard console (security management software)

• Centralised cybersecurity management with real-time dashboards.

• OT visibility including device identification and network traffic analyser.

• Automatically deploy virtual patches without disrupting operations.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Revolutionising mining operations with MineOptimize
IT in Manufacturing
Now more than ever, mining and mineral processing companies need to boost productivity, ensure safety, and protect the environment. ABB’s comprehensive electrification, automation and digital solutions portfolio is ideally positioned to meet these challenges across all mining processes, from mine to port, transforming performance in a digital world.

Read more...
Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
TwinCAT Vision functionality extended
Beckhoff Automation IT in Manufacturing
The image processing and camera integration capabilities of Beckhoff’s TwinCAT 3 Vision software have been expanded.

Read more...
Automation software to future-proof your operations
Adroit Technologies IT in Manufacturing
As the official partner of Mitsubishi Electric Factory Automation, Adroit Technologies empowers businesses with cutting-edge solutions that reduce costs, improve quality and increase productivity.

Read more...
Siemens automation portfolio, your bridge to the industrial metaverse
Siemens South Africa IT in Manufacturing
Step into the future with Siemens’ automation portfolio, your bridge to the industrial metaverse. Our cutting-edge solutions integrate AI, digital twins and real-time simulation, driving smarter, more efficient production.

Read more...
Transform your manufacturing efficiency
TransLution Software IT in Manufacturing
MÄDLER offers a wide range of gears in various materials, modules and designs, available directly from stock.

Read more...
Optimise the cutting of metal materials
IT in Manufacturing
KRON Cutting is a comprehensive web-based system designed to optimise the cutting of metal materials, including rebar, pipes and profiles.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.

Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.

Read more...