Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Automation Products and Services: Focus on Cybersecurity

Security Platform for Micro-segmentation, Remote Access

Airwall Teams, a free, industrial-strength security platform for micro-segmentation and remote access, lets organizations try the standards-based Host Identity Protocol (HIP) to build secure communications channels between devices, regardless of where they are located. This technology ensures secure access across all mobile, corporate, Internet, and cloud networks. Airwall Teams is based on the same network technology as Airwall, an easy-to-manage, enterprise-grade solution that uses HIP and includes a range of scalable hardware gateways and policy management devices. Together they form a private overlay network that sits on top of the existing cybersecurity and network infrastructure.

Tempered Networks

Network Security Appliance

 

network security appliance

The NCA-6520 is a 2U 19-inch rackmount network security appliance with dual third-generation Intel Xeon Scalable processors, high throughputs, built-in crypto acceleration, and NIC module expansion. It has enhanced performance for network security workloads through increased processor cores (up to 40), higher memory bandwidth (1.2 times memory capacity per processor), PCIe-Gen4 support, and fast input/output. Integrated 100 Gbps Intel QuickAssist is a hardware technology that accelerates critical workloads such as data compression and cryptography across server, storage, and network applications.

Lanner Inc.

ICS Cybersecurity Risk Screening Service

A new service, ICS Cybersecurity Risk Screening, helps industrial organizations gain a high-level understanding of the worst-case risk to operations should their industrial control systems (ICSs) be compromised. Using a consequence-based, initial cybersecurity risk screening methodology, the results expose the potential magnitude of cyber risk to operations, assist with prioritizing detailed risk assessments, facilitate the grouping of assets into zones and conduits, and help manage budgets and resources appropriately.

aeSolutions

Proxy Device for Implementation of CIP Security 

proxy device

Industrial companies can now implement CIP Security expansively in their systems with the Allen-Bradley CIP Security Proxy by working with EtherNet/IP-compliant devices. The proxy device allows users with products that are not embedded with CIP Security to define and implement their unique migration roadmap to a CIP Security architecture. It also provides a path forward for products not capable of CIP Security. Configuration can be achieved through FactoryTalk Policy Manager software and FactoryTalk system services. The device also supports motion for Kinetix drives and has a web server for viewing diagnostics.

Rockwell Automation

This blog has been repurposed from InTech.

Steven Aliano
Steven Aliano
Steven Aliano is the Content Marketing Specialist for ISA & ISAGCA.

Related Posts

What Does the Future of Zero Trust in OT Look Like?

Zero trust principles have established themselves in the mindshare of cybersecurity practitioners worldwi...
Jacob Chapman Dec 20, 2024 7:00:00 AM

North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) and ISA/IEC 62443 Comparative Analysis

The Utilities Technology Council and Cumulys recently prepared a report in partnership with the ISA Globa...
Kara Phelps Dec 13, 2024 7:00:00 AM

Securing PLCs Through the Backplane: Balancing Performance and Simplicity

With the increasing convergence of operational technology (OT) and information technology (IT), the need ...
Ashraf Sainudeen Dec 6, 2024 7:00:00 AM