DATA-RICH CONSOLIDATED MANAGEMENT OF SCADA SYSTEMS
Cyber-securing OT networks, that have become prime targets to cyber-attacks in recent years, and managing complex industrial automation operations, both require full visibility and easy access to each and every asset on the industrial network, for reviewing risk and operational status, setting automation procedures, provisioning assets and more.
Now, COPA-DATA and Radiflow offer a bi-directional integrated solution for enhancing the functionality of both the zenon SCADA Management Platform and the iSID Industrial Threat Detection and Monitoring system, by correlating engineering/automation and cyber-defense data, all accessible through highly-customizable HMIs.
THE COPA-DATA ZENON SCADA MANAGEMENT PLATFORM
zenon is a software platform that makes the engineering and automated operation of manufacturing and infrastructure equipment incredibly easy.
zenon enables SCADA operators to collect asset information from heterogeneous hardware arrays, linking and comparing data from multiple assets, visualizing the SCADA network and easily engineer automation solutions.
zenon provides OT operators with a extensive toolset for managing the entire SCADA process. Users are able to customize the visualization of the industrial network, create reports for any operational aspect, record and analyze automation processes, facilitate maintenance operations, and much more.
zenon’s SCADA network visualization view
RADIFLOW iSID – INDUSTRIAL THREAT DETECTION
Radiflow iSID’s network asset and risk dashboard
Radiflow’s iSID Industrial Threat Detection and Analysis System provides superior threat detection and monitoring of abnormalities and changes in the network, as well as complete visibility of all networked assets, ports and protocols, based on self-learning of the OT network through passive scanning of all data transactions.
By continuously analyzing all data traffic, iSID can detect and alert against abnormal activity such as changes in the sequence of the industrial automation process, unauthorized network access and asset changes.
Furthermore, iSID’s advanced attack vector analysis and business process risk scoring capabilities allow users to continually improve their cyber security capabilities in protection, monitoring and mitigation procedures, and optimizing the operator’s investment in cybersecurity.
- Purpose: optimization of threat mitigation through improved asset risk scoring
- Method: Asset configuration data sent to iSID from zenon is used to add context (device name, operational function, business process) and improve the accuracy of iSID’s risk scoring algorithm, which defines which devices are most vulnerable to cyber-attacks and assists the user in prioritizing and taking the most cost-effective mitigation steps.
- Purpose: Single interface for improving response to security alerts and reducing operational complexity
- Method: Alerts relayed from iSID to zenon are displayed directly on the zenon HMI, leveraging the existing SCADA management interface to create a single-pane interface for operations and security. By introducing security information into the operational system, the combined interface is able to improve response time to events and saves the need to set up a dedicated OT SOC or create a custom IT/OT integration.