Cyberattacks are on the rise due to sophisticated attackers and increased device connectivity. Assets, equipment, uptime, trade secrets, brand value, intellectual property and even personal safety need to be protected from malicious network intrusions, employee sabotage or accidental manipulation.
Siemens offers expertise, products and solutions to help you implement a security strategy. Whether you’re just beginning or looking to strengthen your security posture, we are prepared to help you plan and implement a holistic security strategy addressing people, process and technology.
View our recorded webinar: OT Cybersecurity Secrets - Tips and Tricks for Little or No Cost
How secure is your network?
We examine your ability to detect, prevent, and respond to cyber attacks that could harm your organization. An Industrial Network Security Assessment by Siemens network security experts, each with more than 10 years of experience assessing and designing Operational Technology (OT) networks, is a smart first step to securing your assets.Respond to cyberattacks at machine speed with SIBERprotect
SIBERprotect is the most advanced, realtime cyberattack monitoring and response solution for OT systems. SIBERprotect provides sub-second response to a cyberattack and can dramatically limit the impact of a cyberattack. Attacks act at machine speed – SIBERprotect responds at machine speed to protect your assets.
Security by industry
Securing data in an OT environment can be a unique challenge given the different requirements of an OT network v. an IT network (e.g. real-time latency requirements, determinism, keeping critical processes running, controlling physical assets and personal safety). Understanding the defense in depth approach and security standards like IEC 62443 or NERC CIP can be a valuable resource or even required when implementing your security strategy.
Understanding the unique requirements of manufacturing networks is crucial when implementing security measures. For example, data controlling machines must arrive on time, every time to make sure the process runs smoothly. Contrast that with an IT network and the security implementation that may be allowed due to latency standards. An antivirus program on an IT network can take the time to rigorously scan every e-mail because there is not a complex, potentially high-speed, automated operation depending on the receipt of the e-mail at a precise time. It’s important to know when, where and how to implement the right security solution to receive optimal security with minimal or no interference to productivity.
Overview
Our certified industrial network security experts, each with more than 10 years of experience assessing and designing OT networks, will begin discussions with you about the facility, network, assets and security goals. We will perform specified vulnerability scans and create a detailed report with potential vulnerabilities and recommendations that can address the people, process and technology protecting your operation.
Overview
A key part of a successful security strategy is people. Any system is only as strong as the people who use it. Understanding how to implement, manage or just react to security technologies within a policy is important. Industrial security standards call out the importance of a well-trained employees. Siemens offers security training customized to specific topics most relevant to a customers or standard training for an overview.
- Strengthen security knowledge to implement a security strategy
- Learn about proven security concepts, tools, implementation, encryption, firewall, Next Generation Firewall (NGFW)
- Gain hands-on experience with the following: Implementing firewalls; Scanning non-secure and secure networks; Enabling secure protocols, disabling non-secure protocols; Implementing secure availability with VRRP; Setting up and testing NAPT; Segmenting at network with VLAN and firewall; Creating a protected WLAN, Enabling password protection and access control and more…
Overview
Siemens offers security appliances specific for OT & automation applications. We understand the goal is to keep your operation productive and avoid intrusions or unwanted manipulation. To do that it’s important to make sure the right solution is applied in the right place, whether that means implementing a next generation firewall (NGFW), intrusion detection system (IDS), intrusion prevention system (IPS), a stateful packet inspection firewall, encryption, passwords or other security solutions. Network segmentation is a security strategy recommended by the IEC 62443 (Industrial Automation and Control Systems focused) security standard. For more information about how to secure OT & automation networks and industrial control systems (ICS) download the free whitepaper.
Solutions for OT & Automation network security
Stateful inspection firewall, VPN and encryption
-
Segment networks and protect devices. Some features include firewall, secure remote connection and network address translation (NAT / NAPT).
-
Secure Communications Processor (CP) for connection with SIMATIC S7-1500 PLCs to Industrial Ethernet. Enable secure local and remote communication.
-
Secure Communications Processor (CP) for connection with SIMATIC S7-1200 PLCs to Industrial Ethernet. Enable secure local and remote communication.
Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Deep Packet Inspection (DPI) and Next Generation Firewall (NGFW)
-
Specifically developed to provide multiple electronic defense layers for the protection of critical cyber assets. RUGGEDCOM Multi-Service Platform is the main point of entry between the local area network (plant floor or substation) and the outside world. The platform combines a Layer 3 router, a firewall, and a VPN in one device.
-
A variety of security and communication options. The Virtual Processing Engine (VPE) allows for security applications like intrusion detection (IDS). Firewall and secure remote, encrypted communication can be utilized. Cellular (dual SIM) and WiFi are available.
-
Learn how Siemens and certified partners utilize IDS technology to safeguard industrial networks
Overview
Accessibility to production data (OT) at the enterprise level (IT) – where data analytics tools usually reside – improves the ability to measure and analyze data. As a result, cost saving decisions can become more easily identifiable. To ensure greater access to data does not increase security risks, it’s important to secure the communication between networks. Setting up protection between networks that access a common database is referred to as a Demilitarized Zone (DMZ). There are multiple ways to implement a DMZ. Consult a network security expert to identify the right product for the right application based on network requirements. Download this free whitepaper for more information about IT OT security and DMZ.
Solutions with DMZ applications
-
The SC646-2C offers 600 Mbit/s and up to 1,000 firewall rules and may be right for your application.
-
Specifically developed to provide multiple electronic defense layers for the protection of critical cyber assets. RUGGEDCOM Multi-Service Platform is the main point of entry between the local area network (plant floor or substation) and the outside world. The platform combines a Layer 3 router, a firewall, and a VPN in one device.
-
A variety of security and communication options. The Virtual Processing Engine (VPE) allows for security applications like intrusion detection (IDS). Firewall and secure remote, encrypted communication can be utilized. Cellular (dual SIM) and WiFi are available.
-
Learn how Siemens and certified partners utilize IDS technology to safeguard industrial networks
Overview
Secure remote access can save an organization significant time and money by allowing monitoring and troubleshooting of an expert technician immediately and without traveling. There are multiple options to implement secure remote access. Contact a network security expert to help identify the right solution for your application.
Solutions for secure remote access
-
SRC is a management platform for remote networks that allows access to remote facilities or machines conveniently and securely. SRC is easily configured with SCALANCE devices at the remote location, which act as the connection nodes on endpoints.
-
SCALANCE S and SC are security appliances with features including, but not limited to, secure remote access capability using SRC, VPN and encryption. They are easily configurable for secure remote access.
-
SCALANCE M is a cellular device with secure remote access capability using SRC, VPN and encryption. It is easily configurable for secure remote access. AT&T or Verizon data plans and SIM cards can be purchased directly from Siemens.
-
SCALANCE CP 1543-1 is a Communication Processor for use with S7-1500 PLCs with secure remote access capability using SRC, VPN and encryption. It is easily configurable for secure remote access.
-
SCALANCE CP 1243-7 LTE is a cellular device for connection with S-7 1200 PLCs with secure remote access capability using SRC, VPN and encryption. It is easily configurable for secure remote access.
-
RX1400 includes secure remote access capability with VPN and encryption.
-
RX15xx with APE1808 includes secure remote access capability with VPN, encryption and certified partner applications.
-
RUGGEDCOM CROSSBOW is a secure remote access cybersecurity system.
Overview
Networking monitoring and management provides transparency to the network to detect rogue devices and document attempted network access. Policy-based configuration and bulk firmware updates can be implemented to save time and ensure network devices are best configured and equipped with security features.
Solutions for network asset discovery, monitoring & management
-
SINEC INS (Infrastructure Network Services) is the software tool for central network services, which are often required in the Operational Technology (OT) field. It’s easy and straightforward to use. SINEC INS ensures that you’ll make efficient use of frequently required services like Radius and Syslog servers in your network.
-
SINEC NMS can be used to centrally monitor, manage, and configure networks with 50 to 12,500 devices around the clock. It can authenticate user access, support device updates to help keep them secure and detect devices on the network while logging performance data.
It's important to understand the unique requirements and standards (e.g. NERC CIP) of electric power networks when implementing security measures. In a recent study by Siemens and the Ponemon Institute, 54 percent of those surveyed in the utilities industry expect an attack on critical infrastructure in the next 12 months. It’s important to know when, where and how to implement the right security solution to receive optimal security with minimal or no interference to uptime.
Overview
Our certified network security experts, each with more than 10 years of experience assessing and designing OT networks, will begin discussions with you about the facility, network, assets and security goals. We will perform specified vulnerability scans and create a detailed report with potential vulnerabilities and recommendations that can address the people, process and technology protecting your operation.
Overview
A key part of a successful security strategy is people. Any system is only as strong as the people who use it. Understanding how to implement, manage or just react to security technologies within a policy is important. Industrial security standards call out the importance of a well-trained employees. Siemens offers security training customized to specific topics most relevant to a customers or standard training for an overview.
- Strengthen security knowledge to implement a security strategy
- Learn about proven security concepts, tools, implementation, encryption, firewall, Next Generation Firewall (NGFW)
- Gain hands-on experience with the following: Implementing firewalls; Scanning non-secure and secure networks; Enabling secure protocols, disabling non-secure protocols; Implementing secure availability with VRRP; Setting up and testing NAPT; Segmenting at network with VLAN and firewall; Creating a protected WLAN, Enabling password protection and access control and more…
Overview
Siemens offers security appliances specific for OT applications. We understand the goal is to keep your operation productive and avoid intrusions or unwanted manipulation. To do that it’s important to make sure the right solution is applied in the right place, whether that means implementing a next generation firewall (NGFW), intrusion detection system (IDS), intrusion prevention system (IPS), a stateful packet inspection firewall, encryption, passwords or other security solutions. Network segmentation is a security strategy recommended by the IEC 62443 (Industrial Automation and Control Systems focused) security standard. For more information about how to secure OT & automation networks and industrial control systems (ICS) download the free whitepaper.
Solutions for OT network security
Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Deep Packet Inspection (DPI) and Next Generation Firewall (NGFW)
-
Specifically developed to provide multiple electronic defense layers for the protection of critical cyber assets. RUGGEDCOM Multi-Service Platform is the main point of entry between the local area network (plant floor or substation) and the outside world. The platform combines a Layer 3 router, a firewall, and a VPN in one device.
-
A variety of security and communication options. The Virtual Processing Engine (VPE) allows for security applications like intrusion detection (IDS). Firewall and secure remote, encrypted communication can be utilized. Cellular (dual SIM) and WiFi are available.
-
Learn how Siemens and certified partners utilize IDS technology to safeguard industrial networks
Overview
Accessibility to production data (OT) at the enterprise level (IT) – where data analytics tools usually reside – improves the ability to measure and analyze data. As a result, cost saving decisions can become more easily identifiable. To ensure greater access to data does not increase security risks, it’s important to secure the communication between networks. Setting up protection between networks that access a common database is referred to as a Demilitarized Zone (DMZ). There are multiple ways to implement a DMZ. Consult a network security expert to identify the right product for the right application based on network requirements. Download this free whitepaper for more information about IT OT security and DMZ.
Solutions with DMZ applications
-
Specifically developed to provide multiple electronic defense layers for the protection of critical cyber assets. RUGGEDCOM Multi-Service Platform is the main point of entry between the local area network (plant floor or substation) and the outside world. The platform combines a Layer 3 router, a firewall, and a VPN in one device.
-
A variety of security and communication options. The Virtual Processing Engine (VPE) allows for security applications like intrusion detection (IDS). Firewall and secure remote, encrypted communication can be utilized. Cellular (dual SIM) and WiFi are available.
-
Learn how Siemens and certified partners utilize IDS technology to safeguard industrial networks
Overview
Secure remote access can save an organization significant time and money by allowing monitoring and troubleshooting of an expert technician immediately and without traveling. There are multiple options to implement secure remote access. Contact a network security expert to help identify the right solution for your application.
Solutions for secure remote access
-
RUGGEDCOM CROSSBOW is a secure access management solution designed to provide assistance with cybersecurity compliance including NERC CIP (North American Electric Reliability Corporation critical infrastructure protection) and IEC 62443-1 access to Intelligent Electronic Devices (IEDs). The CROSSBOW solution focuses on delivering productivity gains for administrators and users while assisting with cybersecurity compliance in managing, securing, and reporting on remote access.
-
RX15xx with APE1808 includes secure remote access capability with VPN, encryption and certified partner applications.
-
RX1400 includes secure remote access capability with VPN and encryption.
Oil & gas operations networks have unique requirements and it's crucial to understand them when implementing security measures. In a recent study by Siemens and the Ponemon Institute, 66 percent of respondents indicated that oil and gas companies are benefiting from digitalization, but it has significantly increased cyber risks. It’s important to know when, where and how to implement the right security solution to receive optimal security with minimal or no interference to production.
Overview
Our certified industrial network security experts, each with more than 10 years of experience assessing and designing OT networks, will begin discussions with you about the facility, network, assets and security goals. We will perform specified vulnerability scans and create a detailed report with potential vulnerabilities and recommendations that can address the people, process and technology protecting your operation.
Overview
A key part of a successful security strategy is people. Any system is only as strong as the people who use it. Understanding how to implement, manage or just react to security technologies within a policy is important. Industrial security standards call out the importance of a well-trained employees. Siemens offers security training customized to specific topics most relevant to a customers or standard training for an overview.
- Strengthen security knowledge to implement a security strategy
- Learn about proven security concepts, tools, implementation, encryption, firewall, Next Generation Firewall (NGFW)
- Gain hands-on experience with the following: Implementing firewalls; Scanning non-secure and secure networks; Enabling secure protocols, disabling non-secure protocols; Implementing secure availability with VRRP; Setting up and testing NAPT; Segmenting at network with VLAN and firewall; Creating a protected WLAN, Enabling password protection and access control and more…
Overview
Siemens offers security appliances specific for OT & automation applications. We understand the goal is to keep your operation productive and avoid intrusions or unwanted manipulation. To do that it’s important to make sure the right solution is applied in the right place, whether that means implementing a next generation firewall (NGFW), intrusion detection system (IDS), intrusion prevention system (IPS), a stateful packet inspection firewall, encryption, passwords or other security solutions. Network segmentation is a security strategy recommended by the IEC 62443 (Industrial Automation and Control Systems focused) security standard. For more information about how to secure OT & automation networks and industrial control systems (ICS) download the free whitepaper.
Solutions for OT & Automation network security
Stateful inspection firewall, VPN and encryption
-
Segment networks and protect devices. Some features include firewall, secure remote connection and network address translation (NAT / NAPT).
-
Secure Communications Processor (CP) for connection with SIMATIC S7-1500 PLCs to Industrial Ethernet. Enable secure local and remote communication.
-
Secure Communications Processor (CP) for connection with SIMATIC S7-1200 PLCs to Industrial Ethernet. Enable secure local and remote communication.
Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Deep Packet Inspection (DPI) and Next Generation Firewall (NGFW)
-
Specifically developed to provide multiple electronic defense layers for the protection of critical cyber assets. RUGGEDCOM Multi-Service Platform is the main point of entry between the local area network (plant floor or substation) and the outside world. The platform combines a Layer 3 router, a firewall, and a VPN in one device.
-
A variety of security and communication options. The Virtual Processing Engine (VPE) allows for security applications like intrusion detection (IDS). Firewall and secure remote, encrypted communication can be utilized. Cellular (dual SIM) and WiFi are available.
-
Learn how Siemens and certified partners utilize IDS technology to safeguard industrial networks
Overview
Accessibility to production data (OT) at the enterprise level (IT) – where data analytics tools usually reside – improves the ability to measure and analyze data. As a result, cost saving decisions can become more easily identifiable. To ensure greater access to data does not increase security risks, it’s important to secure the communication between networks. Setting up protection between networks that access a common database is referred to as a Demilitarized Zone (DMZ). There are multiple ways to implement a DMZ. Consult a network security expert to identify the right product for the right application based on network requirements. Download this free whitepaper for more information about IT OT security and DMZ.
Solutions with DMZ applications
-
The SC646-2C offers 600 Mbit/s and up to 1,000 firewall rules and may be right for your application.
-
Specifically developed to provide multiple electronic defense layers for the protection of critical cyber assets. RUGGEDCOM Multi-Service Platform is the main point of entry between the local area network (plant floor or substation) and the outside world. The platform combines a Layer 3 router, a firewall, and a VPN in one device.
-
A variety of security and communication options. The Virtual Processing Engine (VPE) allows for security applications like intrusion detection (IDS). Firewall and secure remote, encrypted communication can be utilized. Cellular (dual SIM) and WiFi are available.
-
Learn how Siemens and certified partners utilize IDS technology to safeguard industrial networks
Overview
Secure remote access can save an organization significant time and money by allowing monitoring and troubleshooting of an expert technician immediately and without traveling. There are multiple options to implement secure remote access. Contact a network security expert to help identify the right solution for your application.
Solutions for secure remote access
-
SRC is a management platform for remote networks that allows access to remote facilities or machines conveniently and securely. SRC is easily configured with SCALANCE devices at the remote location, which act as the connection nodes on endpoints.
-
RUGGEDCOM CROSSBOW is a secure remote access cybersecurity system.
-
SCALANCE S and SC are security appliances with features including, but not limited to, secure remote access capability using SRC, VPN and encryption. They are easily configurable for secure remote access.
-
SCALANCE M is a cellular device with secure remote access capability using SRC, VPN and encryption. It is easily configurable for secure remote access. AT&T or Verizon data plans and SIM cards can be purchased directly from Siemens.
-
SCALANCE CP 1543-1 is a Communication Processor for use with S7-1500 PLCs with secure remote access capability using SRC, VPN and encryption. It is easily configurable for secure remote access.
-
SCALANCE CP 1243-7 LTE is a cellular device for connection with S-7 1200 PLCs with secure remote access capability using SRC, VPN and encryption. It is easily configurable for secure remote access.
-
RX1400 includes secure remote access capability with VPN and encryption.
-
RX15xx with APE1808 includes secure remote access capability with VPN, encryption and certified partner applications.
Overview
Networking monitoring and management provides transparency to the network to detect rogue devices and document attempted network access. Policy-based configuration and bulk firmware updates can be implemented to save time and ensure network devices are best configured and equipped with security features.
Solutions for network asset discovery, monitoring & management
-
SINEC INS (Infrastructure Network Services) is the software tool for central network services, which are often required in the Operational Technology (OT) field. It’s easy and straightforward to use. SINEC INS ensures that you’ll make efficient use of frequently required services like Radius and Syslog servers in your network.
-
SINEC NMS can be used to centrally monitor, manage, and configure networks with 50 to 12,500 devices around the clock. It can authenticate user access, support device updates to help keep them secure and detect devices on the network while logging performance data.

On Demand: Executive Cybersecurity Forum for Manufacturers
The security of OT networks is a critical risk management threat that all executives should prioritize. We've brought together industry thought leaders and leading experts on operations cybersecurity to share new perspectives on securing one of your biggest assets - the manufacturing floor.