Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

WatchGuard Adds SCADA Signatures to Firewalls

WatchGuard Technologies today announced that it has added SCADA Signatures to its next-generation firewalls and UTMs with Application Control. The SCADA (supervisory control and data acquisition) signatures enable WatchGuard XTM and legacy e-Series security appliances to provide threat protection for industrial control systems that monitor and control industrial, infrastructure or facility-based networks.

WatchGuard Technologies today announced that it has added SCADA Signatures to its next-generation firewalls and UTMs with Application Control. The SCADA (supervisory control and data acquisition) signatures enable WatchGuard XTM and legacy e-Series security appliances to provide threat protection for industrial control systems that monitor and control industrial, infrastructure or facility-based networks.

Watchguard SCADA SignaturesMajor market trends are driving the need to extend enterprise network security and protection to operational technologies. Many operational technology (OT) networks are converging with information technology (IT) networks. For example, as infrastructure power grids become “smart,” they also stand exposed to similar vulnerabilities that target IP-based business networks.

“Historically, OT networks ran autonomously or were completely disconnected from IT protection and control,” said Tim Helming, Director of Product Management at WatchGuard. “However, as OT and IT networks converge, legacy OT networks become vulnerable to hackers and viruses.”

Publicity around the extremely sophisticated Stuxnet worm over the last year has raised awareness of the need to protect critical infrastructure. Stuxnet marks a new era of highly sophisticated, extremely targeted malware, and in this case, specific to a small group of industrial systems. It portends a new wave of attacks targeted to OT networks, ranging from citywide electrical power grids, traffic monitoring systems down to individual facility HVAC systems.

Written By

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

ICS/OT

A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.