Networks as a security factor

Network security for industry according to cybersecurity recommendation IEC 62443

Network security to protect industrial plants

Cybersecurity is the subject that should be on the agenda of every business right now. With “Defense in Depth” as a comprehensive protection strategy, Siemens provides answers in the form of defense throughout all levels based on the recommendations of IEC 62443. Part of the Industrial Security concept is network security to protect automation networks against unauthorized access. This includes checking all interfaces, like those between office and plant networks, or checking remote accesses to the Internet, and may be carried out using firewalls or, as appropriate, by creating a protected secure zone (a ‘demilitarized zone’ or DMZ). Based on professional planning, design, and the implementation of available, powerful network infrastructures, it is possible to create comprehensive yet secure OT networks.

Select your Industrial Security components using the TIA Selection Tool

TIA Selection Tool

SCALANCE S Industrial Security Appliances as a part of network security support the Defense in Depth industrial security concept

Industrial Security Appliances

SCALANCE S Industrial Security Appliances

The SCALANCE S Industrial Security Appliances as a part of network security support the “Defense in Depth” industrial security concept. They protect automation networks, and seamlessly connect to the security structures of the Office and IT world.

SCALANCE M industry routers enable secure remote access to facilities with integrated security functions (firewall and VPN)

Industrial Routers

SCALANCE M Industrial Routers

The SCALANCE M product range includes both wired and wireless routers. They enable secure remote access to facilities with integrated security functions (firewall and VPN) to protect against unauthorized access and also to protect data transmissions.

Security communication processors protect controllers with integrated firewall and VPN from data manipulation and espionage.

Security Communications Processors

Additional protection using security communications processors

Security communications processors use integrated firewalls (to monitor data flows) and VPNs to protect controllers against data manipulation and espionage.

Software solutions for secure remote access via VPN and to manage industrial networks.

Software for Secure Networks

Software products for various security requirements

Software solutions for secure remote access via VPN to plants and security components and to manage industrial networks.

SCALANCE TAP104 for data traffic to be exported for further data analyses or detection of anomalies.

Data Export

SCALANCE TAP104 for all networks

The SCALANCE TAP104 unmanaged Industrial Ethernet Test Access Port enables data traffic to be exported for further data analyses or detection of anomalies.

Accessories like RJ45 connectors

Accessories and Related Products

More products and services for improved network security

Connector to mechanically lock RJ45 ports and other accessories for SCALANCE S.

Defense in Depth

Secure communication in industrial networks

An approach that covers all levels simultaneously is essential to comprehensively protect industrial facilities both internally and externally – from operational to field level, from access control to copy protection. This is why we use “Defense in Depth” as our comprehensive protective strategy aligned with the recommendations of IEC 62443, the leading standard for security in industrial automation.

Know how your network is protected

Experts calculate that 25 billion communications-capable machines will be networked as part of the Industrial Internet of Things in just a few years from now. This exponentially increases the attack surface and is accompanied by new network security requirements that ensure the continued protection of machines, plants, and expertise. Industrial Security is based on a multilayered concept – “Defense in Depth” – that gives your plant both all-round and in-depth protection. It starts with conventional building access and extends to the securing of sensitive areas by means of key cards. Network security includes the protection of automation networks against unauthorized accesses with network access protection, segmentation, and encrypted communication. System integrity protects your automation systems and control components against unauthorized accesses and meets special requirements such as know-how protection.

Read all about network security

Download brochure

Additional information

Information and downloads

Want to know more about our products for improved network security? Download our information or find out about our portfolio – covering every stage from efficient planning to implementation.

The fastest way to the experts

Proposed solutions for your queries and direct access to our experts in Technical Support

Service offers

To remain competitive over the long term, companies in industry must ensure – and ideally increase – the availability and productivity of  machines and plants. As your partner, we offer a unique range of services and support based on our extensive technology and industry expertise.

Well trained for excellent handling

Receive standardized or individual expertise directly from the manufacturer – with training centers in more than 60 countries.

References

SCALANCE S already in successful use

Discover how industrial enterprises around the world utilize the SCALANCE S portfolio to rigorously improve their network security.

Professional support

Professional support for future-proof communications networks

First-class network components will not create a first-class industrial communications network on their own. A thorough understanding of network designs is at least as important. You get both when you deal with us and our certified Solution Partners. That’s where you benefit: our Professional Services for Industrial Networks give you professional help in developing your network solution – tailored to suit your specific requirements.