Accelerating the Industrial Internet of Things
Log In
Number of Case Studies181
Carmaker Holds the Keys to Network Security
Carmaker Holds the Keys to Network Security
FAW-Volkswagen Automotive Company (FAW-VW) required a high number of communication terminals due to its rapid development. FAW-VW also faced challenges in security management, IT Operation and Maintenance (O&M) costs, and employees work efficiency. FAW-VW needed terminal security protection with reliable access control and user rights management and comprehensive network protection.
SCADA Cyber Security Vulnerability Assessment
SCADA Cyber Security Vulnerability Assessment
A U.S. power company employed regularly-recurring audits of various controls, systems and programs. However, when it came to a SCADA-based cyber security vulnerability assessment, the in-house audit team did not possess the specific combination of process control experience and cyber security risks. They realized they required a third-party expert with a unique combination of knowledge of the two worlds.
Preserving Security and Operator Safety
Preserving Security and Operator Safety
To improve customer satisfaction by minimizing downtime of automated optical inspection machines while preserving security and safety.
Number of Hardware237
Transceivers Misc
Transceivers Misc
USB Transceiver 10.4Kbps Automotive 48-Pin VQFN EP T/R
Unidirectional Security Gateway
Unidirectional Security Gateway
Waterfall Unidirectional Security Gateways replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from attacks originating on external networks. Unidirectional Gateway solutions come in pairs: the TX appliance contains a laser, and the RX appliance contains an optical receiver. The Gateway pair can transmit information out of an operations network, but is incapable of propagating any virus, DOS attack, human error or any information at all back into the protected network.
Unidirectional Security Gateway DIN Rail
Unidirectional Security Gateway DIN Rail
In the face of increased and complex cyberattacks, more and more industrial and critical infrastructure sites are turning to unidirectional gateway technology to prevent remote cyberattacks from entering their control systems. However, many physical environments require a smaller form factor than the rack-mounted Unidirectional Security Gateway. To meet this need, we developed the compact Unidirectional Security Gateway DIN Rail.
Number of Software155
SparkCognition DeepArmor
SparkCognition DeepArmor
DeepArmor is the world’s first fully cognitive anti-malware system.DeepArmor leverages machine learning, natural language processing, and AI algorithms to analyze files and provide signature-free security.
CycurHSM
CycurHSM
For security at ECU level, pure security solutions in software cannot sufficiently protect the integrity of a secure System. Hardware Security Modules are a necessary prerequisite to harden embedded systems against attacks and to provide protection of the integrity of the software.CycurHSM is a complete software stack adapted to the available BOSCH HSM implementations by different silicon manufacturers. CycurHSM provides the technology for fulfilling requirements regarding a flexible HSM firmware that provides open and standardized interfaces to HSM-enhanced security applications.
RSA Security Analytics
RSA Security Analytics
Protect your organization’s valuable digital assets with RSA Security Analytics. RSA Security Analytics lets security operations teams collect and analyze logs, network packets, NetFlow, and endpoint data. These capabilities enable SOC analysts to discover attacks that traditional log-centric security information and event management (SIEM) tools miss.At the time of collection, RSA Security Analytics uses Capture Time Data Enrichment to inspect every piece of data collected for threat indicators. Analysts have the ability to investigate rapidly down to the most granular detail. Your team can understand exactly what is happening and what to do about it.
Number of Suppliers304
Tiandihexing
Tiandihexing
Tiandihexing was founded in 2007 and headquartered in Beijing. It is a research, development and integrated services company providing information security technology for industrial enterprises. The security needs of the power, petrochemical, oil and gas, steel and other infrastructure industrial control system contains vulnerabilities that expose problems to users. Through industrial control systems security vulnerability analysis, evaluation and consulting with Tiandihexing's HX-EICS power industrial information security management platform, HX-SFW industrial firewall, HX-HPS host reinforcement, HX-MAP security audits and other products, provide users with overall solutions for industrial control system network information security solutions, and to provide users with high-quality, professional service.
Uptake
Uptake
Uptake is a SaaS-based product company, combining data science, machine learning and security with deep industry knowledge to drive outcomes in productivity, safety, security and reliability that deliver value to businesses.
TMC
TMC
TMC is a fabless chip deesign company focusing on smart cards and related technologies. TMC provides chip solutions covering mobile communications, financial payment, identification and information security that are widely used in SIM cards, financial IC cards, mobile payment cards, social security cards and so on.
Number of Organizations22
OWASP
OWASP
Our freedom from commercial pressures allows us to provide unbiased, practical, cost-effective information about application security. OWASP is not affiliated with any technology company, although we support the informed use of commercial security technology. Similar to many open-source software projects, OWASP produces many types of materials in a collaborative and open way.Every vibrant technology marketplace needs an unbiased source of information on best practices as well as an active body advocating open standards. The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies and other organizations worldwide. Operating as a community of like-minded professionals, OWASP issues software tools and knowledge-based documentation on application security.All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas. Core Values- OPEN Everything at OWASP is radically transparent from our finances to our code.- INNOVATION OWASP encourages and supports innovation and experiments for solutions to software security challenges.- GLOBAL Anyone around the world is encouraged to participate in the OWASP community.- INTEGRITY OWASP is an honest and truthful, vendor neutral, global community.
Shanghai Pudong Software Park Incubator (SPSP Incubator)
Shanghai Pudong Software Park Incubator (SPSP Incubator)
OASIS Consortium (OASIS)
OASIS Consortium (OASIS)
OASIS is a nonprofit consortium that drives the development, convergence and adoption of open standards for the global information society.OASIS promotes industry consensus and produces worldwide standards for security, Internet of Things, cloud computing, energy, content technologies, emergency management, and other areas. OASIS open standards offer the potential to lower cost, stimulate innovation, grow global markets, and protect the right of free choice of technology.OASIS members broadly represent the marketplace of public and private sector technology leaders, users and influencers. The consortium has more than 5,000 participants representing over 600 organizations and individual members in more than 65 countries.OASIS is distinguished by its transparent governance and operating procedures. Members themselves set the OASIS technical agenda, using a lightweight process expressly designed to promote industry consensus and unite disparate efforts. Completed work is ratified by open ballot. Governance is accountable and unrestricted. OASIS was founded under the name "SGML Open" in 1993. It began as a consortium of vendors and users devoted to developing guidelines for interoperability among products that support the Standard Generalized Markup Language (SGML). The consortium changed its name to "OASIS" (Organization for the Advancement of Structured Information Standards) in 1998 to reflect an expanded scope of technical work.
Number of Use Cases27
Smart Warehousing
Smart Warehousing
Integrated security and logistics solutions for warehouses and logistics operators include an array of services in the alarm and security spaces such as intrusion detection and burglar alarms, access control systems, video surveillance security, fire detection and fire alarms. In addition to that, remote managed services such as video guard tours can fully support business operations and provided continues security.
Security Claims Evaluation
Security Claims Evaluation
Security Claims Evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities.In an industrial environment setting, monitoring of sensors provides a window into system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is indication of a cybersecurity / security breach.Security Claims Evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using machine learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an endpoint to gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods.
Perimeter Security & Access Control
Perimeter Security & Access Control
Perimeter Security and Access Control systems protect the external perimeter of a facility, control access to restricted areas, and detect and monitor anomalies. Access control includes the control of persons, vehicles and materials through entrances and exists of a controlled area or premises. Perimeter detection, in contrast, is the detection of access to the outer limits of a detection area by means of physical barriers, sensors on physical barriers, or exterior sensors. Finally, intrusion alarm systems signal entry or attempted entry of a person or an object into the area or volume protected by the system.Since at least the Roman Empire, fortifications, walls and barriers have been an important part of protecting sovereign territories and private property. Perimeter security is designed with the primary purpose to either keep intruders out or captives contained within the area the boundary surrounds. Both natural and man-made barriers can serve as perimeter security.Governments utilize perimeter security not only for the safety of their citizens, but to control the flow of commerce and immigration, as well as to protect vital infrastructure from vandals and terrorists. Property owners and organizations of all sizes use various man-made technology to achieve varying degrees of perimeter security.
Number of Terms78
IoT Security
IoT Security
IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things.
Threat Modeling
Threat Modeling
Structured analysis to identify, quantify, and address the information security risks associated with an application or a system.
Datagram Transport Layer Security (DTLS)
Datagram Transport Layer Security (DTLS)
In information technology, the Datagram Transport Layer Security communications protocol provides communications security for datagram protocols.
181 Case Studies
237 Hardware
155 Software
304 Suppliers
43 Events
22 Organizations
27 Use Cases
78 Terms
45 Guides
test test