BELDEN INC in Industrial Control Systems Security Solutions

Are you from this Company?
BELDEN INC
St. Louis, USA
1902
Enterprise
75 Likes
63 Buyers Negotiating

Summary

The portfolio of securing industrial controllers handles the security status of PLC, RTU, and DCS. The portfolio also provides protection against unauthorized access and changes, and also provides embedded security, threat intelligence, and response.

The company offers the following solutions in the ICS security market:

Securing Industrial Networks

  • Secure Zones
  • Monitoring
  • Securing Remote Access and Privileges, Wireless and Industrial Protocols
  • Intrusion Radiation Protection

Securing Industrial PCs, Endpoints, and Critical Assets

  • Inventory Connected Assets
  • Detect Malicious Changes
  • Identify Vulnerable Systems
  • Establish and Maintain Hardened Configurations
  • Certified with Tripwire

Securing Industrial Controllers

  • Security Status of PLC, RTU, DCS, and IED
  • Protect against Unauthorized Access and Changes
  • OEM and Embedded Security
  • Threat Intelligence and Response

EAGLE One - Security Bridge and Router

  • Combine Stateful Packet Inspection (SPI) for connected or steered correspondences with special Firewall Learning Mode
  • Add safe, savvy assurance to your mechanical computerization arrange
  • Build associations for generation cells joined with Network Address Translation (NAT) strategies

EAGLE20/EAGLE30 - Industrial Firewalls with HiSecOS Software

  • Use Stateful Packet Inspection (SPI) firewalling and optional Deep Packet Inspection (DPI) for routed communication to secure industrial networks
  • Build connections with 2 optional SHDSL ports and up to 6 LAN ports, of which, 2 are Gigabit
  • Deploy easily with one-click rule setup with unique Firewall Learning Mode
  • Reduce downtime with redundancy protocols

Tofino Xenon - Security Appliance with DPI

  • Protect PLCs, RTUs control devices with this stealth industrial firewall that provides stateful and industrial protocol deep packet inspection at Layer 2
  • Easy installation through Zero-impact Plug-n-Protect technology which requires no pre-configuration, no network changes, and no disruption to the control system
  • Configure-Test-Deploy: Zero-day vulnerability protection with deep protocol awareness that is not dependent upon vulnerability updates

Industrial Routers with Built-in Security

Magnum 10RX Router and Security Appliance

  • Built-in firewall protection and Virtual Private Network (VPN) security with Layer 3 advanced routing
  • Compliant with IEC 61850 for substations
  • Reduce downtime via a dual, hot-swappable feature for field replacements on live networks

 Magnum DX940e - Industrial Cellular Router

  • Configure with flexibility: 6 Gigabit ports, optional WAN (T1/E1) port, serial ports, and 4G/LTE cellular
  • Connect easily through this 4G/LTE cellular gateway with advanced firewall, VPN, routing, and crypto capabilities
  • Provide secure, reliable connectivity over a cellular network

Remote Access - Secure Remote Access Solution

  • Provide remote network access and diagnostics through a simple three-component system:

 – GateManager operates as a cloud service; hosted by Hirschmann or hosted by another company

– SiteManager makes it possible to connect remote devices to the GateManager clouds. It runs on a Windows PC or selected Hirschmann devices

– LinkManager provides secure, on-demand access to remote devices via the cloud

Cyber Resiliency Software and Support - Tripwire Industrial Visibility (TIV)

  • Complete uninvolved procedure that analyzes modern system traffic to perform mechanical resource revelation, profile all modern convention correspondence, and provide danger recognition starting from the dmz to the field I/O gadgets
  • Understands over 40+ mechanical conventions including EtherNet/IP, ModBus, DNP3, S7, PROFINET, IEC 101/104, GOOSE, and Bacnet
  • Provides perceivability into controller mode changes, arrangement changes, and firmware transfers
  • Diagrams organize correspondence traffic designs by means of purdue display

Tripwire Enterprise (TE) Security Configuration Management Suite

  • Tripwire Data Collector provides full network visibility and understands common industrial protocols such as Modbus TCP and Ethernet/IP
  • Agentless monitoring requires no software installation or changes
  • Includes Rockwell AssetCentre, MDT AutoSave, and Kepware KEPServerEX
  • Maximize uptime with real-time detection of threats
  • Gain an in-depth visibility into cyber security hygiene and monitor PCs, PLCs, and other network hardware for changes
  • Instantly gain broad cyber security coverage to comply with an increasing number of industry standards, such as NERC CIP, IEC 62443, and NIST

Tripwire Log Center (TLC)

  • Think “Security Historian” with the ability to turn out robust reporting on all log data
  • Featuring a purpose-built dashboard for out of the box functionality with the Tofino Xenon
  • Log collection from a variety of sources to easily interpret and parse data for analysis and reporting
  • Create custom dashboards to gain real-time visibility to critical events
  • Create correlation rules with simple, Visio-like interface

 

 

Discussions

Strengths
  • +11
    Protection from malware
  • +10
    Data Protection
  • +8
    Risk/VaR Simulation
  • +9
    Software Enabled Methodology
  • +8
    Customer Support
  • +11
    Other Services
  • +12
    Post Deployment
  • +11
    Pre Deployment
  • +9
    Risk Management Services
  • +9
    Sales Support
  • +7
    Technical Support
  • +5
    Device Control
  • +12
    ISA-99 (Industrial Automation & Control Systems Security)
  • +14
    NIST 800-82 (Guide to Industrial Control Systems)
  • +5
    ISO/TR 22100-4
  • +7
    NIST 171
  • +8
    NIST CSF
  • +7
    Deep packet inspection
  • +6
    Critical Infrastructure Protection Standards (NERC-CIPs)
  • +11
    ENISA- Appropriate security measures for smart grids
Cautions
  • -8
    Lack of Visibility
  • -9
    Education & Training
  • -5
    Incident Response
  • -5
    Risk and Threat Assessment
  • -7
    Risk Based Asset Classification
  • -10
    On-premise
  • -13
    Cyber attack simulation
  • -14
    Implementation
  • -12
    Regulatory compliance
  • -10
    IOC detection tools
  • -14
    Log review tools
  • -8
    Multi-purpose tools
  • -9
    Network traffic anomaly detection tools
  • -11
    Outlier analysis tools
  • -13
    Reverse engineering tools
  • -12
    System artifact review tools
  • -8
    Audit And Reporting
  • -10
    Others, please specify
  • -6
    Distributed Control System (DCS)
  • -6
    Engineering workstations
BELDEN INC Presence in Industrial Control Systems Security Solutions
Belden’s growth depends on three main principles, namely product strength, inorganic and organic growth, and business expansion. The foundation of Belden's strategy is handling its product portfolio to leverage revenues at a higher margin and strategically develop products for protecting and enhancing its brands, thereby continuously improving the business processes as well as increasing its global footprint. In order to grow its business, Belden is pursuing organic and inorganic opportunities in the world’s fast-growing regions. For example, in line with its organic growth strategy, the company has launched new products, namely Industrial HiVision 7.0 and Secure Remote Access for Industrial Networks. As aprt of its organic growth strategy, Belden has entered into various partnerships. One of its most successful strategic plans was the acquisition of Tripwire in 2014. This acquisition enabled Belden to add a product segment to its next-generation cyber-security solutions, which can be deployed across enterprises, industries, and broadcast markets. The company also partnered with FireEye, one of the leading players in the ICS security market, to come up with effective processes for measuring the security of both their systems and safeguarding industrial networks and critical infrastructure. Belden has been driving its business growth by transforming itself from a cable company to a signal transmission solutions supplier with a comprehensive product portfolio, including networking, connectivity, and cybersecurity.
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup