Protect your data
According to a current Bitkom study, 3 out of 4 companies fall victim to cyberattacks such as data theft, industrial espionage or sabotage every year. In Germany alone, this results in total damage amounting to EUR 100 billion a year, due to for example replacement measures, legal disputes, patent infringements and defaults. Regular security updates that are guaranteed over the entire term are required for optimal protection of machines and systems. However, as the runtime increases, the effort required to provide these updates increases, too.
First questions we ask in this context
First Steps: Prevent Uncontrolled Data Streams
Our solution for these increasing security requirements is the cbb edge.SHIELDOR, which has been developed and tested over many years and protects industrial machines from attacks from both, inside and outside. By using exclusively required services and the segmentation and monitoring of these services, a distinction can be made between the network of machines / systems (OT-network) and the higher-level network (IT-network). This strictly prevents an uncontrolled exchange of information.
Obsolete and insecure protocols are secured by converting them into up-to-date secure protocols. The advantage of this procedure is that the participants to be protected behind the gateway can be operated without interruption, as security is guaranteed by the gateway. In this way, more complex and outdated systems can be operated without updates (inventory protection). Not only common industrial protocols are supported, but also administrative services and protocols.
Next Steps: Manage Your Data Successfully
The data exchange takes place via our cbb edge.CONNECTOR and the corresponding protocols. All required data is read from the source protocol and broken down. In addition, the cbb edge.SHIELDOR offers an automated software update process with a configuration interface. A web status interface enables web services, machine status, logging and user authentication with access authorization to be called up by users regardless of location.
The entire network topology is concealed from attackers, so that if a subnetwork is compromised, there is no possibility of accessing other participants behind the gateway. In addition to the unrestricted use of all machines and systems, the cbb edge.SHIELDOR guarantees a long-term safety of your machines and systems.
Application Examples and Technical Data at a Glance
The Solution Brief for the cbb edge.SHIELDOR presents practical application examples: What are the advantages of the product when used in a wide variety of application scenarios, such as file or screen transfers from IT to OT.
Download our new data sheet for the cbb edge.SHIELDOR and find out all the technical details about the product; supported protocols and ports, data transfer options and the associated support.