Monitors logs, performance at network layer

Verano Inc. reports that its Industrial Defender solution suite addresses the five phases of best practices for mission-critical security defined by NIST, NIPC, Department of Homeland Security, Argonne National Labs, Sandia National Labs, and Pacific Northwest Labs. These five phases are: monitor, detect, notify, protect, and recover.

01/01/2004



Verano Inc. reports that its Industrial Defender solution suite addresses the five phases of best practices for mission-critical security defined by NIST, NIPC, Department of Homeland Security, Argonne National Labs, Sandia National Labs, and Pacific Northwest Labs. These five phases are: monitor, detect, notify, protect, and recover.

As a result, Industrial Defender consists of three modules: Watch, Guard, and Control. The Watch module is installed as an appliance at the control network layer on SE Linux, running on an IBM X-Series server, and monitors logs and performance. These functions fulfill the monitor, detect, and notify phases on the best practices list. Industrial Defender's Guard and Control modules were scheduled to be launched before the end of 2003, and will round out the suite by addressing the list's protect and recover requirements, respectively.

Brian Ahern, Verano's president and CEO, reports that Industrial Defender is platform agnostic and runs on automation systems from many vendors, including ABB, Emerson, Foxboro, and Honeywell. Ahern says each of these vendors could offer similar security solutions, but it would require them to redesign their systems, which is a problem that Verano can sidestep by offering an independent solution running on a separate server.

Verano adds that it has been providing mission-critical plant control and monitoring solutions to the power, energy, transportation, and utilities markets for 12 years. www.verano.com

  • Watch, Guard, Control modules meet varying security requirement levels

  • Watch module is first real-time security management system for the control network

  • Guard module's cyber-shield protects control infrastructure from cyber intruders

  • Control module provides secure supervisory control solutions for operations

EC 2003 Winners

Click here to view the full list of 2002 Editors' Choice Awards winners
Click here to return to the article introduction





No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Intelligent, efficient PLC programming: Cost-saving programming languages are available now; Automation system upgrades; Help from the cloud; Improving flow control; System integration tips
Smarter machines require smarter systems; Fixing PID, part 3; Process safety; Hardware and software integration; Legalities: Integrated lean project delivery
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
PLCs, robots, and the quest for a single controller; how OEE is key to automation solutions.
This article collection contains several articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Special report: U.S. natural gas; LNG transport technologies evolve to meet market demand; Understanding new methane regulations; Predictive maintenance for gas pipeline compressors
Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again