Products and Solutions

Industrial Security Solutions to Mitigate Risks

Main Image

You have people and assets to protect. It is time to mitigate potential threats and build a holistic security system to enable deeper visibility into operations, improve collaboration among people, and obtain even higher levels of efficiency. We can help you achieve The Connected Enterprise with a comprehensive portfolio of industrial security solutions and products.

CIP Security

Implement Cybersecurity Measures More Thoroughly and Quickly

CIP Security™ is an extension to the ODVA Common Industrial Protocol (CIP™) for EtherNet/IP™ networks. CIP Security-enabled devices can play an important part in a defense in-depth strategy, helping to fortify the last level of the control system by:

  • Enabling protection for EtherNet/IP connected devices from malicious communications by providing data authenticity, integrity and confidentiality
  • Using Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) cryptographic protocols to help provide secure transport of EtherNet/IP traffic
  • Using keyed-Hashed Message Authentication Code (HMAC) providing data integrity and message authenticity
  • Using X.509v3 Digital Certificates to provide cryptographically secure identifies to devices

Secure Network Infrastructure

Control Access to the Network, and Detect Unwanted Access and Activity

A resilient industrial network security system is essential to ensure that proper access is only given to the right people and that data is protected against manipulation or theft. Our validated network security solutions, based on standard Ethernet/IP™, enable unified plant-to-enterprise integration. We can help optimize networks for use in industrial applications and the use of enabling technologies including mobility, data analytics, and cloud.

  • Secure the perimeter and enable IT connectivity with the Industrial Demilitarized Zone
  • Enable remote connectivity of people, process, and information with remote access and system monitoring
  • Unify enterprise and plant floor security controls with Stratix® managed switches and industrial firewalls, such as the Stratix 5950 Security Appliance
  • Reduce implementation risks by using tested and validated network designs from Cisco and Rockwell Automation

Learn More About Our Stratix 5950 Security Appliance
View Networks and Security Design Guides and Whitepapers

Access Control and Policy Management

Control Who, What, Where, and When Access Is Allowed

You need to prevent access violations of unauthorized users and minimize the potential exposure to threats from internal resources. You can control access and implement policies to determine who, what, where, and when access is allowed to our applications and control system equipment.

  • Centrally manage user authentication and authorization of user permissions with FactoryTalk® Security
  • Integrate management user accounts with Active Directory
  • Leverage scalable solutions for flexible workflows around disconnected environments, guest user access, temporary priviledge escalation, and more
  • Harden applications by limiting the usage of tags with Data Access Control

Content Protection

Protect the Viewing, Editing, and Use of Your Application Content

Automation equipment, like controllers, can potentially contain sensitive information that sets your business apart. We can help you establish a common, secure environment for your industrial systems to protect your intellectual property while maintaining productivity and quality.

  • Restrict access to authorized personnel for specific Add-on Instructions and routines with License Based Source Protection in the Studio 5000® Integrated Design Environment
  • Prevent overuse of restricted code or functionality with Execution Protection

Tamper Detection

Detect and Respond to Unwanted Activity and Modifications in the System

We can help you protect the integrity of your operations with solutions to detect, record, and respond to potential threats in the control system.

  • Centrally record and track user actions in the system using FactoryTalk® AssetCentre
  • Schedule backups of operating asset configurations and electronic files and folders
  • Automatically detect modifications to asset configurations and protected content
  • Respond to incidents with disaster recovery capability
  • Regularly discover and maintain an inventory of all devices on the plant floor
Ready to talk to a Rockwell Automation consultant?

We offer industry expertise to help design, implement and support your automation investment.