IT in Manufacturing


Moxa’s industrial cybersecurity solutions

May 2020 IT in Manufacturing

Industrial networks today are no longer air-gapped and immune from cybersecurity threats. Although deploying a firewall and segmenting networks is a good first step, how are OT engineers, who primarily work with industrial protocols and may lack sufficient IT security expertise, supposed to prevent cybersecurity threats from infecting and spreading across networks? After all, the cybersecurity landscape is constantly changing and goes far beyond blocking the spread of worms or unauthorised PLC commands.

Moxa’s industrial cybersecurity solution is specifically designed to secure industrial networks from both an OT and IT perspective to better address the surging market demand for a comprehensive cybersecurity solution for industrial networks. The solution includes critical IT cybersecurity technologies such as an intrusion prevention system (IPS), a key component for defence-in-depth strategies, which has been specifically tailored to protect OT networks from cyber threats without disrupting industrial operations.

How Moxa’s industrial IPS works

Moxa’s industrial IPS features OT-centric deep packet inspection technology, enhances IT network security visibility, and ultimately helps mitigate risks and protects industrial networks from security threats. Deep packet inspection can identify multiple industrial protocols and allow or block specific functions, such as read or write access. Based on the identified protocol, the industrial IPS can then prevent any unauthorised protocols or functions. This way, users can be more confident that the traffic on their industrial networks is trusted and non-malicious. In addition, Moxa’s industrial IPS provides virtual patching of vulnerabilities for operating systems, application software, and industrial equipment such as PLCs. By effectively integrating OT and IT technologies, Moxa’s industrial IPS safeguards critical assets from the latest cybersecurity threats.

In order to ensure that network activity on industrial networks is authorised, Moxa’s industrial cybersecurity solution allows users to define granular access controls at different levels. They can define a whitelist of devices and IP ports that are allowed to access all or part of their entire

network. In addition, they can also define the authorised protocol format to prevent unauthorised commands from passing through the industrial IPS or firewalls. Furthermore, OT engineers can even define which control commands can pass through the network to reduce human error associated with sending a wrong control command. Whitelisting control significantly reduces the likelihood of a DoS attack by OT Trojans.

How to mitigate cyber risks while maintaining system availability

Risk 1: even though a north-south bound firewall has been implemented, unauthorised network access through third parties may still happen. Most serial data communication (proprietary protocols) are not encrypted, leaving the communication unsecured and open to exploitation

Risk 2: if users do not have a full understanding of their industrial network status, they may not be able to respond quickly or effectively.

Risk 3: leaving unused service ports open may lead to a DoS attack.

Risk 4: unauthorised devices may implant malware into the HMI which then spreads across the network.

Risk 5: most serial data communication protocols are not encrypted, leaving the communication unsecured and open to exploitation.

Risk 6: security patches are not available or feasible for PLCs.

Mitigating such vulnerabilities to secure industrial networks is Moxa’s first priority

IEC-G102-BP series (industrial IPS/IDS)

• Hummingbird-sized industrial security box with IPS/IDS.

• Fine-grained policy enforcement with whitelisting control.

• Bump-in-the-wire installation without impacting the network.

IEF-G9010 series (industrial firewall)

• Compact, security-hardened, and rugged design.

• Fine-grained layer 2 to layer 7 firewall policy with IPS capability.

• Industrial NAT and network segmentation.

Security dashboard console (security management software)

• Centralised cybersecurity management with real-time dashboards.

• OT visibility including device identification and network traffic analyser.

• Automatically deploy virtual patches without disrupting operations.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...
Quantum computing power: four steps to protecting your business
IT in Manufacturing
Are you ready for Q-day? Post-quantum cryptography isn’t just an IT issue, it’s a business continuity concern. Quantum computing is fast becoming a reality.

Read more...
Schneider Electric relaunches legacy access control systems
Schneider Electric South Africa IT in Manufacturing
Schneider Electric South Africa has relaunched its comprehensive access control platform to help customers upgrade from ageing and obsolete systems.

Read more...
Digitalisation in mining - the advantage you need now
Schneider Electric South Africa IT in Manufacturing
Digitalisation offers immense and proven benefits such as streamlining operations, reducing error and accelerating workflows. Mining operators today leverage digital technologies to improve efficiency, sustainability and very importantly, safety.

Read more...
The shape of water – automating hydropower operations
Schneider Electric South Africa IT in Manufacturing
Hydropower is undoubtedly one of the building blocks of today’s renewable energy industry and its operations need to be efficient, reliable and sustainable. Automation must therefore form part of today’s modern hydropower operations to improve resource management and enhance reliability.

Read more...
What lies beneath – the hidden cost of AI
Schneider Electric South Africa IT in Manufacturing
The world is quickly realising that with the rapid advancement in AI there are also caveats. In short, apart from environmental implications, it also has major significant financial ramifications.

Read more...