Integrated Approach to Protecting ICS
Tuesday, October 18, 2016 @ 05:10 PM gHale
Introducing IT capabilities into the industrial control system environment brings with it complex security implications and makes OT systems vulnerable to cyber attacks.
On top of that, systems are complicated webs of proprietary protocols, interfaces and custom software that make standardized tools difficult to develop. As a result, ICS owners have had to patch together piecemeal solutions using manual processes or leverage home-grown technologies.
The following is a cyber security framework whitepaper for deploying and managing best-in-breed cyber threat management products across multiple OEM vendors.
Leave a Reply
You must be logged in to post a comment.