Belden, Schneider Electric pair on cybersecurity firewall

Sponsored by

Belden Inc. announced that Schneider Electric has expanded its ConneXium network and security offer with the addition of EtherNet/IP Deep Packet Inspection (DPI) to the ConneXium Tofino Firewall.

The addition of DPI for the popular EtherNet/IP protocol allows Schneider Electric’s customers to further harden their industrial control systems against network incidents and cyberattacks.

It also allows easier enforcement of company policies for network and device access. The result is improved operational security, reliability and performance.

The ConneXium Tofino Firewall inspects and secures network traffic to and from Schneider Electric automation devices, providing protection from traffic storms, malformed messages and deliberate hacking attempts. In addition, the technology can be used to enforce plant procedure. For example, it can be used to block inappropriate modification or programming of critical devices and controllers, preventing costly mistakes and improving overall network uptime and reliability.

The central functionality of the ConneXium Tofino Firewall is a security appliance/firewall that inspects each network message that passes through it, ensuring that only the right network messages from the right computers can be sent to critical controllers. Hacking attempts, deliberately corrupted messages and even network traffic storms are effectively prevented.

Deploying and configuring the product is made easy for engineers who are not generally security experts through the use of Tofino Security’s patented Plug-n-Protect technologies. This includes expert technology that looks for common mistakes in firewall programming and corrects them with a single mouse click. Specific Schneider Electric product know-how is also built in, with pre-configured firewall templates for their major automation products.

Advanced protection is provided through DPI technology. Traditional IT firewalls examine TCP/IP headers in network messages and then make decisions whether to allow or block a message based on this limited information. DPI technology allows the firewall to dig deep into the SCADA and ICS protocols that sit on top of TCP/IP. The firewall then determines exactly what the protocol is being used for and makes better decisions on what should be allowed or blocked.

Sponsored by

CURRENT ARTICLES

Using EPRI technology to weather the next Superstorm

10/31/2014 Damage prevention refers to the application of engineering designs and advanced technologies that harden the power system ...

NorthWestern wins FERC approval to finance hydro transaction

10/31/2014

. The issuance of securities will be used to finance the hydroelectric acquisition from PPL Montana

Brazil’s households consuming more electric power

10/31/2014

Brazilian households accounted for 10.5 terawatt-hours, up 2.9 percent on the same period last year

DOE invests $13 million in advanced nuclear power reactors

10/31/2014 The Energy Department announced awards for five companies to lead key nuclear energy research and development projects sup...

KCP&L files rate increase request with Missouri Public Service Commission

10/31/2014 One of the primary reasons for the proposed increase is the utility’s need to recover costs for federal and state-mandated...

After Fukushima, Japan has renewable energy boom

10/31/2014 The utilities say they can't accommodate the flood of newcomers to the green energy business, throwing in doubt the future...

ERCOT expects enough electricity for winter, spring

10/31/2014

Generation resources for this winter in the ERCOT region total more than 77,350 MW 

ON DEMAND WEBCASTS

Architecting Communication Networks for Smart Grids

This webinar will provide the essentials of communication networking to meet the challenges of th...

The Power of Behavioral Design: Lessons for Energy Efficiency Providers

Behavioral design principles are key differentiators when it comes to influencing consumer behavi...

3D BIM for Substations—Driving Efficiency from Design Through Operation and Maintenance

In this webinar, PESTECH will describe their transition to intelligent substation design and its ...

High Availability Networks. Application of IEC6439-3 Protocols for IEC61850 Process Bus implementation

Networks can now be built for the first time with genuinely uninterrupted data communication betw...

Understanding Moisture Dynamics in Power Transformers

While the need to measure moisture in power transformers has been well documented and is universa...

EL&P BUYER'S GUIDE PRODUCTS

MITEM Corp

Provides CRM solutions for regulated U.S. public utilities. The product, MitemView integrates differently designed systems to share critical data a...

Resources on Demand

Manages resource requests, tracks personnel movements, and supports lodging/logistics during a power restoration event.

Smart Grids

Quanta is contributing to its customers' smart grid initiatives by installing technology on power networks to provide energy management solutions f...

Horizontal Directional Drilling

With 28 small, mid-sized and large drilling rigs, Quanta Pipeline Services is one of the largest horizontal directional contractors in the world fo...

FEATURED ENERGY JOBS

View more Job Listings >>

POWERGRID International

April 2014
Volume 19, Issue 4
1404pg-cover

ELECTRIC LIGHT & POWER

January 2014
cover