Secure data integrity for Industrial Legacy systems
Industrial legacy system security done right
Let us talk about your solution
Fill in the form and we will contact you
Secure data integrity for industrial legacy systems
- Hardware-based Layer 2 encryption of data in motion over Ethernet connections
- Plug-in and encrypt solution
- No local IT skills needed
- Highest commercially available encryption level, AES 256-GCM
The threat to industrial legacy systems
The biggest threat to industrial systems is external access to control systems. Unwanted access to human/machine interfaces (HMI) could allow third parties full control of systems. One way of breaching a system is to gain access to the Ethernet connections between an industrial company HQ and its remote system by wiretapping. By means of wiretapping it will be possible to manipulate data traversing an Ethernet connection if the connection is not protected.
Protecting data integrity
A common challenge for industrial companies with multiple locations is to support industrial systems, i.e. SCADA systems, PLCs etc. that control:
- Heating, ventilation and air conditioning systems (HVAC)
- Public address & general alarm systems (PA/GA)
- Video surveillance systems
- Electronic or mechanical systems
Protection of data integrity in relation to data connections to systems that do not support application-based encryption: Industrial systems are designed for longevity and may not be designed with modern cyber security concerns in mind. Old systems do not support application-based encryption, which means that industrial companies need other means to protect the remote systems.
Zybersafe hardware encryption
Zybersafe provides protection of the integrity of data that traverses the Ethernet connections between HQs and remote systems. By placing Zybersafe hardware encryption units at the end points of links, all data will be encrypted to meet the highest commercially available standard, AES 256-GCM, and the integrity link will be protected from injection, modification, and replay.
Zybersafe applies Layer 2 encryption, which protects Layer 2 and all layers above. 99.9% of all network attacks are directed against Layer 3-7. Zybersafe’s solution is hardware-based and is secure by design so that there is no human access to encryption keys at any time, which means that the keys cannot be shared by mistake or due to malicious intent.