![]() "Remote support engineers can employ mGuard to quickly navigate to any of the VMs to make program changes or install hotfixes," said Eliya. All control system terminals (OS servers/clients, ES, etc.) are running as virtual machines on ESXi host servers. The chemical company and aeSolutions recently implemented a Siemens Virtualization as a Service (SiVaaS) system, which provides a virtual PCS 7 architecture using VMWare vSphere and ESXi. "We implemented mGuard switch from Phoenix Contact and used their servers to establish an encrypted, IPsec protocol, VPN tunnel between their control system network and our engineering workstation." ![]() "One of our clients is a specialty chemicals firm that makes resins, and they didn't allow outside access to the company network, but they did have customized logic with frequent bugs, and their local staff wasn't trained in PCS 7 controls," said Eliya. These include encrypted communications, managed virtual private network (VPN) tunnels, hosted servers or server clusters, and secure cloud services managed via web-based platforms. To make cloud computing, virtualized tools, and other digital formats more secure, Eliya reported there are several basic methods for monitoring them. ![]() "This is especially true when users engage in dangerous methods for achieving remote access, such as connecting control systems to company networks, connecting directly to the Internet, and/or working around IT security policies."Įliya presented "Using the cloud for secure remote access to control systems," on the second day of Siemens Automation Summit 2018 in Marco Island, Fla. "Remote access enables technical support and increased worker productivity to counter the exponential growth of automation, but it comes with security risks," said Peter Eliya, safety and control systems automation specialist at aeSolutions, system integrator and consulting engineering firm in Greenville, SC. ![]() Wouldn't it be great if these powerful virtual and digital tools could be used to improve security at the same time? Glad you asked. You don't need to be an IT or cybersecurty expert to use these tools," said Peter Eliya, safety and control systems automation specialist at aeSolutions.The knock against cloud-computing services is they require more and closer-integrated networking connections, and these usually come with increased cybersecurity risk. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |