Cyber Security 

OCTOBER FEATURED PRODUCTS

view all

RESOURCES

in Cyber Security
  • InfinityQS publishes book debunking Cloud Computing Myths

    Free eBook combats cloud computing fiction with fact, and encourages quality and IT professionals to consider cloud-based tools as a solution for... MORE

  • Green Hills Software Announces Security Advisors Program

    IoT Security Advisors will provide security services for organizations that must manage privacy and security challenges associated with the IoT. MORE

  • Siemens Introduces Managed Security Service

    Service includes assessment of security posture, implementation of recommended security measures and transitions into ongoing defense against cyber... MORE

  • view all

    WHITE PAPERS

    in Cyber Security
  • Enterprise IoT Security Challenges Facing Industrial Automation 
    Enterprise IoT Security Challenges Facing Industrial...

    By Cormac Garvey, HAL Software
    Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand... MORE

  • Securing Industrial Embedded devices 
    Securing Industrial Embedded devices

    By Mahesh Subrmaniam, HCL
    Paper provides an overview of cyber security standards, procedures and design considerations to be made during embedded... MORE

  • Windows XP End of Service: Practical Options for Industrial Applications 
    Windows XP End of Service: Practical Options for...

    By Belden
    Windows XP could be everywhere in your plant: in PCs, HMIs, and hundreds of embedded devices used for process control and automation.... MORE

  • view all

    CASE STUDIES

    in Cyber Security
  • Wolffkran employs INSYS  for IP-based remote maintenance  
    Wolffkran employs INSYS for IP-based remote maintenance

    The company introduced an IP-based remote maintenance system for their products that ensures a high degree of IT security by using encrypted VPN... MORE

  • Axis thermal network cameras provide security for a solar field 
    Axis thermal network cameras provide security for a solar...

    With 34 cameras installed along the perimeter of the photovoltaic field, Solesa can detect animals, people, objects, acts of vandalism or attempted... MORE

  • Multivac uses remote service to keep packaging machines running 
    Multivac uses remote service to keep packaging machines...

    Multivac packaging machines work in multi-shift operation up to seven days a week. Diagnostic data requested via remote service provides insight... MORE

  • view all

    EVENTS

    in Cyber Security
    November 5, 2014 - November 7, 2014
    Las Vegas , NV, USA


    Remote Monitoring & Control 2014 will cover the latest advancements for monitoring and managing distributed equipment and facilities via recent developments in SCADA, remote networks (wireless & wired), security (cyber & physical), automation, onsite and back-up power, M2M and all other manner of technology that allows for the management of remote assets.

    November 10, 2014
    The Hague , Netherlands


    This one day conference will provide engineers, project managers, and control automation professionals with data connectivity and security information they need to increase the performance, efficiency and safety in their projects.

    November 19, 2014 - November 20, 2014
    Anaheim , CA, United States of America


    Rockwell Automation welcomes industrial professionals, media, analysts, and technology and service providers to its Automation Fair® event. Through exhibits, labs, technical sessions and forums, attendees will learn how to leverage the connected enterprise to optimize production, improve machine performance, and manufacture products in a safer, more sustainable manner.

    view all

    TRAINING

    in Cyber Security
    July 1, 2013 - June 30, 2015
    Online , KS, USA


    This course is intended to provide an understanding of the types of computer-based devices, systems and networks used in modern industrial plants as well as the ways in which these elements can be compromised via cyber attacks. Attendees will also learn to build risk management techniques to improve their plant’s cybersecurity.

    December 9, 2014


    With Microsoft’s recent end of support for Windows XP, running on an outdated SCADA system could be costing your company time and money. It could also compromise both the security and performance of your enterprise.

    December 16, 2014


    ICONICS securely connects to virtually any equipment, information system or network infrastructure through classic OPC, OPC UA, BACnet, SNMP, database, Web Service and Modbus standards. Learn how to use Platform Services with built-in auto-discovery and comprehensive security.