Home Solutions Products edge.SHIELDOR

Protect your data

According to a current Bitkom study, 3 out of 4 companies fall victim to cyberattacks such as data theft, industrial espionage or sabotage every year. In Germany alone, this results in total damage amounting to EUR 100 billion a year, due to for example replacement measures, legal disputes, patent infringements and defaults. Regular security updates that are guaranteed over the entire term are required for optimal protection of machines and systems. However, as the runtime increases, the effort required to provide these updates increases, too.

First questions we ask in this context

How safe are your older parts of your system and machine infrastructure?
When did your systems and machines receive their last security update?
In the event of a total failure, how high would your overall damage be?

First Steps: Prevent Uncontrolled Data Streams

Our solution for these increasing security requirements is the cbb edge.SHIELDOR, which has been developed and tested over many years and protects industrial machines from attacks from both, inside and outside. By using exclusively required services and the segmentation and monitoring of these services, a distinction can be made between the network of machines / systems (OT-network) and the higher-level network (IT-network). This strictly prevents an uncontrolled exchange of information.

Obsolete and insecure protocols are secured by converting them into up-to-date secure protocols. The advantage of this procedure is that the participants to be protected behind the gateway can be operated without interruption, as security is guaranteed by the gateway. In this way, more complex and outdated systems can be operated without updates (inventory protection). Not only common industrial protocols are supported, but also administrative services and protocols.

Are your data safe?

Next Steps: Manage Your Data Successfully

Digitize your systems, protect your networks and get the most out of your data!

The data exchange takes place via our cbb edge.CONNECTOR and the corresponding protocols. All required data is read from the source protocol and broken down. In addition, the cbb edge.SHIELDOR offers an automated software update process with a configuration interface. A web status interface enables web services, machine status, logging and user authentication with access authorization to be called up by users regardless of location.

The entire network topology is concealed from attackers, so that if a subnetwork is compromised, there is no possibility of accessing other participants behind the gateway. In addition to the unrestricted use of all machines and systems, the cbb edge.SHIELDOR guarantees a long-term safety of your machines and systems.

Application Examples and Technical Data at a Glance

Application Examples

The Solution Brief for the cbb edge.SHIELDOR presents practical application examples: What are the advantages of the product when used in a wide variety of application scenarios, such as file or screen transfers from IT to OT.

Technical Features

Download our new data sheet for the cbb edge.SHIELDOR and find out all the technical details about the product; supported protocols and ports, data transfer options and the associated support.