Mobile Navigation

Monitoring

View Comments PDF

Focus on Plant Security

| By Suzanne Shelley

Claroty

Claroty

Protect plant assets from cybersecurity threats

The fully integrated Claroty Platform (photo) incorporates realtime vulnerability monitoring and network “hygiene” insights with attack-vector analysis capabilities, allowing industrial asset owners to better protect industrial control systems from cyberattacks. The system includes a comprehensive, integrated suite of products that are designed to provide safe, passive threat monitoring to protect industrial networks. It continuously monitors for new anomalies and vulnerabilities and analyzes pathways to their most important assets. It is suitable for use in electric transmission systems or oil-and-gas pipelines, says the company. The product produces a comprehensive report for plant operators, detailing the industrial network and its assets, to give users deeper insight into the state of the network configuration and any weaknesses. — Claroty, New York, N.Y.

www.claroty.com

 

 

Rite-Hite

Rite-Hite

Dock leveler helps to improve security at loading docks

The RHV-4100 Vertical-Storing Hydraulic Dock Leveler (photo) protects workers from injury and improves efficiency and security at loading docks. With this interior dock configuration, trucks back up to the loading dock with their doors closed. Once they are secured at the dock, the trailer’s security seal is broken and the doors are then opened into the buiding. This allows for faster loading and unloading, and helps to increase the security of the facility. The RHV functions as a “power-up/power-down unit,” so operation requires constant pressure on the controls. Removing pressure from the “raise” or “lower” buttons immediately stops movement of the leveler. It includes an automatic safety stop that is activated when personnel movement is detected in the leveler pit area during operation. — Rite-Hite Corp., Milwaukee, Wis.

www.ritehite.com

 

 

Larson Electronics

Larson Electronics

Remotely operated camera safeguards plant assets

The EXPCMR-IP-POE-1080P-FIWA explosion-proof security camera provides crisp, clear imagery within the 194-deg horizontal field of view, which makes it ideal for work-site monitoring and general inspections. It provides live feed, with 1,080-pixel resolution, from inside tanks, reactors and other vessels, making it ideal for remote inspection in hazardous locations. The live stream from this camera can be recorded with user-provided equipment. For instance, the camera can be hooked up to network cable and run back to a user-provided DVR system mounted outside the hazardous loation, protecting plant personnel. — Larson Electronics LLC, Kemp, Tex.

www.larsonelectronics.com

 

 

 

These courses will strengthen your plant-security expertise

The company’s extensive CSP (Cybersecurity Practitioner) Program consists of various IEC 62443-based Industrial Automated Control System cybersecurity courses, which are presented by the company. The courses, related to such topics as safety-critical and high-availability automation systems, control system cybersecurity, alarm management and more, and the overall certification program, are designed to help participants develop and demonstrate competency in assessing and mitigating cybersecurity threats. They are appropriate for participants considering Certified Automation Cybersecurity Specialist (CACS) or Certified Automation Cybersecurity Expert (CACE) certification, says the company. Participants who are able to demonstrate that they have retained the knowledge presented earn a CSP Certificate. — Exida, Sellersville, Pa.

www.exida.com

 

Avery Products

Avery Products

Better signage improves security

The adhesive Surface Safe Sign Labels allow chemical process plants to improve signage without damaging painted walls, windows or stainless steel, and without leaving a messy residue (photo). The sign labels are made from durable polyester material that is water-, chemical-, abrasion- and tear-resistant. They are used to create caution, hazard, compliance, warning and confined-space signage, as well as signage for office and meeting spaces. They are easy to customize (using the company’s template software). Users can print finished labels and signs from a desktop printer, or have them custom-printed by the company. — Avery Products Corp., Brea, Calif.

www.avery.com

 

 

 

 

 

Mocana

Mocana

Adding another layer of protection to control devices

This company has launched Mocana TrustCenter (photo), a new services platform that allows manufacturers and operators of Internet of Things and Industrial Control Systems (ICS/IoT) devices to securely enroll and update them. With TrustCenter, Mocana can automatically manage secure updates of software, hardware and firmware on millions of IoT/ICS devices in seconds, preventing compromises and any malware compromises. This solution aims to not only find vulnerabilities and resolve them with traditional IT security solutions, but also to protect the software and firmware and all components on these devices against cybersecurity threats, using strong authentication and cryptography to verify that the device and software updates are secure. The new services platform complements the company’s TrustPoint IoT endpoint security software, which already protects more than 100 million devices today, says the company. The new automated platform can be deployed “on bare metal,” or via private cloud or public cloud Infrastructure-as-a-Service (IaaS), and ensures the trustworthiness of both the device and the data from end to end, says the company. — Mocana Corp., San Francisco, Calif.

www.mocana.com

 

Standardizing the approach to managing vulnerabilities

With more than 17,000 cybersecurity vulnerabilities disclosed within the past year, according to this software company, organizations throughout the chemical process industries (CPI) are often forced to rely on a patchwork of security patches, and many process operators operate with relatively scarce internal IT resources. This company recommends a standardized, three-pronged approach to reducing risk and managing chemical process plant vulnerabilities, with the goal of determining risk criticality using vulnerability intelligence, prioritizing remediation options for known vulnerabilities (based on criticality), and applying patches to mitigate risk with an emphasis on testing in controlled environments. The company’s Vulnerability and Software Asset Management (SAM) solutions help process operators to evaluate and procure the right software and cloud services to reduce compliance and security risk. — Flexera Software, Itasca, Ill.

www.flexera.com

 

Integrated components can improve safety and reduce risk

Process Safety Office provides process safety and risk professionals with an integrated suite of tools to support process hazards analysis, auditing, consequence analysis, risk analysis, facility siting and evaluation and design of pressure-relief and flare systems. This versatile toolbox presents a seamless integration of process safety and information technologies for compliance, risk management and business efficiencies to support process-safety-management programs. Each of the components — SuperChems, PHAGlobal, ioViper, ioLogic, ioVu, ioAuditor, ioSecure, User-Defined Component and iViewer — supports different risk-minimization objectives, such as improved consequence analysis related to facility siting, pressure-relief and flare-systems evaluation and design, process hazards analysis, evaluation of vibration-induced fatique in process and relief piping, construction of visual piping isometrics, auditing safety protocols, report generation and more, says the company. — ioMosaic, Salem, N.H.

www.iomosaic.com

 

Cybersecurity solutions safeguard infrastructure

This company’s broad technology offerings are designed to protect infrastructure in industries, such as oil-and-gas and power-grid installations. The SNOK Cybersecurity Monitoring Solution monitors both the network and endpoints (hosts) to detect intrusions. It is a scalable, distributed, small-data solution designed to perform local detection of malware, espionage, sabotage or other harmful cyber events, says the manufacturer. SNOK is designed for industrial sites running on hardware with limited computing power. Products in this portfolio include Network Intrusion Detection System (IDS), Endpoint Monitoring, PLC Threat Detection, Enterprise Solution, and Asset Discovery. Customers can request a 30-day trial program and analysis report. — Secure-NOK, Houston

www.securenok.com

 

Siemens

Siemens

Use anomaly detection to boost industrial cyber security

The Industrial Anomaly Detection solution enables security-related incidents, such as unauthorized intrusions and malware, to be identified and countermeasures to be taken (photo). The software can be pre-installed on an industrial PC and easily integrated into industrial environments, or it can be enabled to run on network components from this manufacturer, such as its multiservice platform Ruggedcom RX1500 with Ruggedcom APE. It is said to be especially well-suited for companies in the chemical, pharmaceutical, food and beverage, water- and wastewater-treatment sectors. The anomaly-detection system incorporates artificial intelligence (AI) with machine learning, to configure the system (for instance, automatically analyzing data traffic in the network in the “learning phase,” so it can then reliably detect anomolies that might indicate intrusion or data threat by hackers). If deviations are detected, the system automatically sends an alarm to users. Depending on the criticality, the incidents can be dealt with by onsite experts or external security specialists. — Siemens AG, Nuremburg, Germany

www.siemens.com

 

Lightweight cases protect valuable plant gear

The Pelican Air Case (photo) is now available in several new sizes that are deeper and able to protect expensive equipment, drones, camera gear and more. The three latest additions to this product line (Models 1557, 1607 and 1637) have been reengineered to be lighter, yet just as sturdy and durable as other options in the traditional Pelican Protector Case family, says the company. The entire Pelican Air Case line, constructed of lightweight HPX2 resin, is available in nine travel-ready sizes, in both long and deep configurations. These travel cases are available in black, yellow, orange or grey. A variety of customizable interior divider systems are available to ensure precise protection of stored equipment without wasting space. — Pelican Products, Torrance, Calif.

www.pelican.com