Loading

Cybersecurity Built on Leading Technology

Reliable approaches for true defense-in-depth
An internet LAN line connects to a computer with red binary code double exposed, to show security breaches and spyware
Cybersecurity Built on Leading Technology
Reliable approaches for true defense-in-depth
Cybersecurity
    • Overview
    • Overview
    • Overview
    • Zero Trust
    • Zero Trust
    • Identity & Access Management
    • Identity & Access Management
    • IT / OT Convergence
    • IT / OT Convergence
    • CIP Security
    • CIP Security
    • Technology & Certification
    • Technology & Certification
    • Security & LifecycleIQ
    • Security & LifecycleIQ
    • Secure Digital Transformation
    • Secure Digital Transformation
    • NIST Cybersecurity Framework
    • NIST Cybersecurity Framework
    • Overview
    • Overview
    • Overview
    • Managed Services
    • Managed Services
    • Threat Detection
    • Threat Detection
    • Incident Response
    • Incident Response
    • SOC as a Service
    • SOC as a Service
    • IT Cybersecurity Services
    • IT Cybersecurity Services
    • Endpoint Protection
    • Endpoint Protection
    • Overview
    • Overview
    • Overview
    • Critical Infrastructure
    • Critical Infrastructure
    • Life Sciences
    • Life Sciences
    • Automotive
    • Automotive
    • Manufacturing
    • Manufacturing
    • Food & Beverage
    • Food & Beverage
    • Mining
    • Mining
    • Overview
    • Overview
    • Overview
    • Advisories & Support
    • Advisories & Support
    • Design & Planning
    • Design & Planning
    • Network Security
    • Network Security
    • Penetration Testing
    • Penetration Testing
    • Respond & Recover
    • Respond & Recover
    • Risk Assessment
    • Risk Assessment
    • Vulnerability Assessment
    • Vulnerability Assessment
  • World Class Partners
    • Blogs
    • Blogs
    • Press Releases
    • Press Releases
    • Webinars
    • Webinars
    • Whitepapers
    • Whitepapers

Recent malware attacks have caused hundreds of millions of dollars in downtime and loss of production in single companies. Rockwell Automation provides products and services to help you protect vital intellectual property, customer information, productivity, physical assets, the environment, workers, and your reputation.

Our industrial expertise includes standards, certifications and practices that deliver more consistent and reliable production and a stronger cybersecurity defense posture. We can help secure your infrastructure, protect assets, and maintain network availability, so you can continue to innovate and prosper.


How Do You Secure a Factory from Floor to Cloud?

With FactoryTalk software for modern industry

FactoryTalk® software is built for supporting an ecosystem of advanced industrial applications, including Internet of Things (IoT) and remote access control. It all starts at the edge where manufacturing happens, and scales from factory floor to the enterprise to the cloud.

Imagine supercharging your industrial environment with systems that let you maximize your profitability through secure and safe access. Execute cutting edge designs, maximize operational efficiencies, and gain predictive and augmented maintenance advantages, adding flexibility unpredictable and dynamic situations, such as the extreme pivoting of worker locations required by the pandemic.

From process to batch to discrete applications, your most complex challenges are solved with the combination of award-winning Rockwell Automation software, hardware and LifecycleIQ™ services.

Loading

Loading

Secure Network Infrastructure

Control access and detect unwanted intrusions or activity

A resilient industrial network security system ensures that proper access is only given to the right people in the right circumstances, and that data is protected against manipulation or theft.

Our validated network security solutions, based on standard EtherNet/IP™, enable IT and OT convergence benefits with true plant-to-enterprise integration. Rockwell Automation helps you safely leverage today’s industrial applications and modern technologies, such as mobility, data analytics, and cloud. The right network design:

  • Secures the perimeter and enables safe IT and OT connectivity through an Industrial Demilitarized Zone (IDMZ)
  • Enables secure remote connectivity between people, processes, infrastructure and information through policy-controlled access and system monitoring
  • Unifies enterprise and plant floor security controls with Stratix® managed switches and industrial firewalls, such as the Stratix® 5950 Security Appliance
  • Reduces implementation risks by using tested and validated network designs from Cisco and Rockwell Automation

Protect the Viewing, Editing and Use of Your IP

FactoryTalk® Security centrally manages user authentication

Automation equipment can contain sensitive information, such as critical IP assets in industries like automotive, pharmaceuticals, or food and beverage. You need to prevent unauthorized users from access to minimize threats from internal resources and external threat actors.

FactoryTalk® Security lets you control access and implement policies to determine who, what, where, and when access is allowed to applications and control system equipment. FactoryTalk Security:

  • Centrally manages user authentication and authorization of user permissions
  • Integrates management user accounts with Active Directory
  • Leverages scalable solutions for flexible workflows around disconnected environments, guest user access, temporary privilege escalation, and more
  • Hardens applications by limiting the usage of tags with Data Access Control
Loading
Loading

Chevron DownChevron Down
Video
IEC 62443 and Zero Trust in Today’s Industrial Cybersecurity

Rockwell Automation and cybersecurity experts discuss IEC 62443 and Zero Trust in industrial cybersecurity.

IEC 62443 Certifications: Securing Connected Operations

Securing products and components used in ICS networks

Companies that want to protect critical information, productivity and safety in connected operations require products that are developed with security in mind. Rockwell Automation makes security a priority in product development with its security development lifecycle (SDL) approach, which is certified to meet the IEC 62443-4-1 security standard. TÜV Rheinland performed the independent certification of the Rockwell Automation SDL, which covers these components:

  • IEC 62443-4-1 applies to those responsible for designing, manufacturing, implementing, or managing industrial controls
  • IEC 62443-4-2 specifies the technical requirements for securing the individual components and products used in an ICS network
  • IEC 62443-3 addresses security requirements for a systematic defense of Industrial Automation and Control Systems (IACS) with an outline of required workflows and associated responses to identified risks

Speak to an expert about how our IEC 62443 certifications enhance security in your connected enterprise.

Contact a Rockwell Automation Cybersecurity Specialist
Contact Us
Recommended for You
Loading
  • Sales
  • Customer Care
  • TechConnect Support
  • General Questions
  1. Chevron LeftChevron Left Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Cap... Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Cybersecurity Solutions Chevron RightChevron Right
  4. Chevron LeftChevron Left Modern Industrial Security Starts Here Chevron RightChevron Right
  5. Chevron LeftChevron Left Cybersecurity Technology and Certifications Chevron RightChevron Right