Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Automation Products and Services: Focus on Cybersecurity

Security Platform for Micro-segmentation, Remote Access

Airwall Teams, a free, industrial-strength security platform for micro-segmentation and remote access, lets organizations try the standards-based Host Identity Protocol (HIP) to build secure communications channels between devices, regardless of where they are located. This technology ensures secure access across all mobile, corporate, Internet, and cloud networks. Airwall Teams is based on the same network technology as Airwall, an easy-to-manage, enterprise-grade solution that uses HIP and includes a range of scalable hardware gateways and policy management devices. Together they form a private overlay network that sits on top of the existing cybersecurity and network infrastructure.

Tempered Networks

Network Security Appliance

 

network security appliance

The NCA-6520 is a 2U 19-inch rackmount network security appliance with dual third-generation Intel Xeon Scalable processors, high throughputs, built-in crypto acceleration, and NIC module expansion. It has enhanced performance for network security workloads through increased processor cores (up to 40), higher memory bandwidth (1.2 times memory capacity per processor), PCIe-Gen4 support, and fast input/output. Integrated 100 Gbps Intel QuickAssist is a hardware technology that accelerates critical workloads such as data compression and cryptography across server, storage, and network applications.

Lanner Inc.

ICS Cybersecurity Risk Screening Service

A new service, ICS Cybersecurity Risk Screening, helps industrial organizations gain a high-level understanding of the worst-case risk to operations should their industrial control systems (ICSs) be compromised. Using a consequence-based, initial cybersecurity risk screening methodology, the results expose the potential magnitude of cyber risk to operations, assist with prioritizing detailed risk assessments, facilitate the grouping of assets into zones and conduits, and help manage budgets and resources appropriately.

aeSolutions

Proxy Device for Implementation of CIP Security 

proxy device

Industrial companies can now implement CIP Security expansively in their systems with the Allen-Bradley CIP Security Proxy by working with EtherNet/IP-compliant devices. The proxy device allows users with products that are not embedded with CIP Security to define and implement their unique migration roadmap to a CIP Security architecture. It also provides a path forward for products not capable of CIP Security. Configuration can be achieved through FactoryTalk Policy Manager software and FactoryTalk system services. The device also supports motion for Kinetix drives and has a web server for viewing diagnostics.

Rockwell Automation

This blog has been repurposed from InTech.

Steven Aliano
Steven Aliano
Steven Aliano is the Content Marketing Specialist for ISA & ISAGCA.

Related Posts

Should ISA/IEC 62443 Security Level 2 Be the Minimum for COTS Components?

A recent white paper published by the ISA Security Compliance Institute (ISCI) and its ISASecure certific...
Liz Neiman Apr 23, 2024 5:18:27 PM

How to Secure Machine Learning Data

Data security is paramount in machine learning, where knowledge drives innovation and decision-making. Th...
Zac Amos Mar 12, 2024 11:10:47 AM

Fortifying Your Security Arsenal: A Strategic Approach to Safeguarding OT Security Assets from Adversarial Threats

Introduction Despite investing significant budgets and resources in security products and services. The c...
Mohannad AlRasan Mar 5, 2024 9:17:57 AM