Protocol Security Gateway
Stop Data Communication Intruders In Their Tracks
If your investment / infrastructure is controlled or monitored using a system which uses a data communication protocol such as BACnet/IP then it is vulnerable to attack. Depending on the attack and the equipment being controlled the attack can cause permanent and critical damage and harm. Other protocols have similar vulnerabilities and similar risk profiles. For example. Modbus/TCP.
How can you really protect against this?
If one person can change a set point or change an operating parameter then so can any one else!
The Protocol Security Gateway can stop intruders in their tracks by preventing read requests and write commands passing from one side of the gateway to the other unless authorized.
Authorization is done for one / any combination of a number of controls such as limiting who can read or write what data during which time period.
Full Audit Trails, Reports Intruder attempts The Protocol Security Gateway can provide audit reports: who changed what and when. It can also provide intruder reports and email designated personnel when attempts are made to make unauthorized changes.
Next: Business Plan