Säkerhet och tillförlitlighet

Aleksandr Värä

Aleksandr Värä

Head of IoT

När traditionell industriautomatisering och andra verksamheter med avgörande säkerhetskrav befinner sig mitt i en digital transformation blir säkerhet extra viktigt för tillförlitlighet och trygghet. Blandningen av uppkopplade maskiner och gamla, potentiellt sårbara system skapar en miljö där storskaliga IT-attacker möjliggörs, vilket äventyrar både tillförlitligheten och den fysiska säkerheten i industrimiljön.

Nixus expertis inom säkerhet och tillförlitlighet omfattar industriapplikationer i branscher som olja och gas, energiproduktion (kärnkraft och konventionella system), energidistribution, komponent-/produkttillverkning och marina system och produkter. Vårt övergripande mål är att se till att din digitala transformation blir framgångsrik genom att ge dig stöd i din strategis alla delar; från inköp av nya produkter till att säkerställa att viktiga ICS-funktioner förblir intakta samtidigt som avgörande konnektivitet till andra funktioner upprätthålls. Vi samarbetar också med internationella organisationer som IAEA för att utveckla och dela best praxis inom IT-säkerhet.

Hos oss kan du vara trygg med att säkerheten i din nya miljö konstrueras på rätt sätt och blir tillförlitlig på riktigt – vare sig det handlar om att köpa in nya maskiner/applikationer till befintliga miljöer eller bygga en ny miljö från grunden.

Tjänster

Nixu Cyber Defense Center

Nixu Cyber Defense Center protects your core processes and people. It offers return-on-investment tools for non-technical business owners who want to secure the continuity of their trade. It creates value by offering security that your customers trust. Our specialists and systems monitor, contain and remediate security threats within your business processes. Unlike basic security tools such as virus software, we can monitor your whole information ecosystem. Our response team leads the investigation whenever there is a recognized threat.

Industrial security development as a service

Your safety and continuity is our top priority. As a result, we are ready to take the lead in developing and maintaining the security of your ICS environment. In addition to implementing relevant security policies, guidelines, and technical controls, we will benchmark the security of your environments with industry standards and work together with you to make sure that your security is optimized to the relevant threat landscape and your risk appetite.

ICS security assessments & red teaming

Be it evaluation of your defensive capabilities or delivery of a new industrial environment, we will help you with testing the security controls of your ICS environment as well as your capability to react to a security incident. Depending on the scope, our services vary from ICS-environment security assessments as part of a desktop exercise to state-sponsored attack simulations on supply-critical utilities.

SCADA hardening

SCADA systems are the heart of industrial environments and are therefore a sweet spot for an attacker. Our role is to provide you with the capabilities to withstand a cybersecurity attack without compromising the core processes of your environment. Our services include technical and process-related projects to ensure a sustainable result for your organization.

Vendor security requirements

As the industrial internet gains momentum, Nixu will support you in ensuring that the innovations created by your vendors do not jeopardize the safety and continuity of your production environment. We will help you to request vendors for security product standards, maintenance, and remote access capabilities to meet your industry best practices and standards. Depending on our client’s industry, we utilize the most recognized security standards and recommendations such as IEC62443, NIST, IAEA, ISO27002, NERC CIP, and more.

Collaborator security audit

The Collaborator Security Audit Service provides customers possibility to verify that security status of their partners and collaborators does not create unacceptable risks, the contractual requirements for security are followed and that the processes and security governance of collaborators is sound and according to industry best practices.

Bloggar