Cryptographic Modules That Integrate into the Automation Control and Machine-to-Machine Systems

The ViPNet SIEM Core & Pack industrial cryptographic modules are security solutions that can be easily integrated into industrial automation control systems. ViPNet ViPNet SIEM Core & Pack support a wide range of industrial fieldbuses and are used for data protection of industrial systems and machine-to-machine interaction (M2M). The modules perform cryptographic operations as a set of simple commands for processing user data. ViPNet SIEM Core & Pack solve various tasks related to storing and protecting cryptographic keys, as well as supporting the keys’ life cycle. The modules use industrial and board-to-board interfaces to exchange data with the automation control systems.

Key Security Features

  • Data integrity (inability to distort data)
  • Data confidentiality
  • Data spoofing prevention by creating and verifying digital signatures
  • Data source identification and authentication

Scope

  • Automated Process Control Systems
  • Automated Electric Power Metering Systems, Advanced Metering Infrastructure
  • Building Automation Systems
  • Building Management Control Systems
  • Transportation Management Systems
  • Energy Management Systems
  • Electronic Security Systems, Access Control Systems
  • Geolocation Systems
  • Robotics
  • Emergency Management Systems

Advantages for Machine Manufacturers

  • Direct access to machines and systems, independent of their location
  • A high security standard, required by operators
  • Complete transparency for the used software: ViPNet VPN makes it possible to perform all actions as if they were executed on the spot on a local network
  • No cost-intensive dedicated lines or telephone lines required: all types of Internet connections are supported (WLAN, GPRS, UMTS, LTE, etc.)
  • Connecting the customer service employee to the local system
  • Access to older machines without individual remote maintenance interfaces

Advantages for Machine Operators

  • Protection of production equipment from a potentially unsafe area on the local network
  • Highly secure virtual departments: the system can only be controlled and monitored within these
  • Systems and system parts installed outside production halls can be securely connected to a central production site
  • External access is made possible according to the company's available security policies and does not affect the network's security
  • Individually adaptable access rights to machine data