Another Practical White Paper from Tofino #cybersecurity #pauto #ISA99 #ISA_IEC_62443 #automation

June 4, 2013
The folks at Tofino have released another highly practical white paper, this one titled "Secure Industrial Networks with the Right Tools." It gives you six recommendations for how to make your plant more cyber secure. 

The folks at Tofino have released another highly practical white paper, this one titled "Secure Industrial Networks with the Right Tools." It gives you six recommendations for how to make your plant more cyber secure.

  1. Select industrial grade components
  2. Look for redundancy and robustness
  3. Seek technologies that integrate with industrial network management systems
  4. Deploy firewalls that secure industrial protocols
  5. Practice defense-in-depth with zone-level security
  6. Focus your efforts
Read the entire white paper here: https://www.tofinosecurity.com/blog/secure-industrial-networks-right-tools?utm_source=hs_email&utm_medium=email&utm_content=8962763&_hsenc=p2ANqtz-_rxijnZpzak_rYOf6USKmcUC1QsnHO0AgEtcXjzYrshZIycDuIS56etqpDYI_relaRNi7BK4YeJ1WZUVWpckO9TJuYhg&_hsmi=8962763

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.