Siemens’ SIMATIC S7-400, the enhanced application module FM 458-1 DP has set new standards with an intelligent module which combines powerful arithmetic operations, high-processing speed, precision, and flexibility. Siemens offers ICS security products, such as SIMATIC HMI, SIMATIC PCS 7, and SIMATIC SCADA. The SIMATIC series is a unique and integrated system designed for deployment in all manufacturing applications and among all industries and functions, such as quire manufacturing, process automation, or solutions for infrastructural tasks. The company’s ICS services include managed security services, maintenance services, training and consulting services, and professional services.
SIMATIC SCADA systems and SIMATIC industry PCs together form a high-performance, reliable platform for data acquisition, evaluation, and visualization. A harmonized and certified complete package for all industries.
Siemens was the first company to receive security certification in August 2016 from TÜV SÜD (Inspection and Certification organization in Germany) for an automation system based on IEC 62443-4-1 and IEC 62443-3-3.
USP : Siemens offers ICS solutions through SIRIUS, a unique, comprehensive portfolio for ICS applications. Its strength lies in its modular design, which can be easily integrated into distributed systems. SIRIUS consists of monitoring and control devices, safety systems, position and safety switches, and commanding and signaling devices. Its control systems consist of multi-processor systems that contain simple combinable function blocks, such as simple mathematics or logical operations through motion control of all linear and rotational axis.
|Feature and Functionality|
- Product Maturity / Common standards / ISA/IEC 62443-2-1ISA Security CompliancesThe ISA Security Compliance Institute operates one of the first standardized assessment schemes for the ISA/IEC 62443 IACS cybersecurity standards, and this program has been heavily adopted by Siemens as a leading provider of automation equipment and industrial security services, as well as being a global manufacturing company. Show More
- Product Maturity / Pre Deployment / Cyber attack simulationVulenrabilty to Cyber AttacksIndustrial processes are exposed to cyber risks through a range of vulnerabilities in software and hardware technologies as well as weaknesses inherited from the legacy design of ICS networks Show More
- Product Maturity / Secure Web Gateways / Application ControlControl-Layer Protocols Are Difficult to SecureOne of the biggest technical challenges one faces while securing ICS networks is that several different communication protocols are used in ICS networks. Show More
- Product Maturity / Distributed Denial Of Service / Behavior ...SNOK Network Intrusion Detection SystemThe company’s core technology, SNOK, monitors Industrial Automation and Control Systems (IACS) from the inside to detect cyber-attacks. Secure-NOK’s unique approach combines network and endpoint monitoring with anomaly behavior detection. Show More