RSS feed Get our RSS feed

News by Topic

security automation

Results 101 - 121 of 121Sort Results By: Published Date | Title | Company Name
By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Balancing the increased pressure to improve productivity and quality, while reducing cost against mandated safety regulations is one of the most complex challenges in industry today.
Tags : process automation, ecostruxure plant, operational profitability, cybersecurity, safety, smart control, empowered operators, optimized assets
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Integrating safety and process environments can improve reliability, profitability and cybersecurity. Read Frost & Sullivan’s white paper and plan your digital transformation today.
Tags : process safety, profitable safety, smart control, empowered operators, optimized assets, future of automation, reliability, cybersecurity
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Since the sepia-toned days of the early 19th century, industry has sought effective ways to control manufacturing and production processes. New technology has greatly influenced factories and plants, resulting in new operational approaches to maximize benefits and achieve 100% ROI in a very short time.
Tags : process control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Today’s plants are faced with managing two major challenges: the increasing speed of business and integrating emerging technologies. Leveraging IIoT as a basis for plant modernization could result in big payoffs: download the white paper to learn more.
Tags : smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
     Schneider Electric
By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : asset management, technology, software asset management, compliance, mitigation of security risks, automation, security
     ServiceNow
By: Shavlik Technologies     Published Date: Dec 14, 2010
Norway MSP chooses Shavlik to improve efficiencies in patch management and within a week regains stability, lost weekends and peace of mind.
Tags : shavlik security, patch management, network stability, deployment, netchk protect, automation, roi
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 15, 2010
Fortunately, Shavlik Technologies takes the sting out of the patch management process, while at the same time accelerating and continuously improving security and compliance readiness.
Tags : shavlik, patch management, security vulnerabilities, compliance, networking, automation
     Shavlik Technologies
By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
     Symantec
By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
     Tripwire
By: Tripwire     Published Date: Apr 21, 2010
This paper includes key research findings, from a recent IDG survey, and strategies to overcome this legacy challenge.
Tags : tripwire, legacy log management, data security, compliance automation solutions, it security, cso
     Tripwire
By: Tripwire     Published Date: Apr 21, 2010
Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.
Tags : tripwire, pci dss compliance, it security, automation solution, payment card industry, data security standard, audit
     Tripwire
By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit
     Tripwire, Inc
By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log
     Tripwire, Inc
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center
     Tripwire, Inc
By: Tripwire, Inc     Published Date: Mar 10, 2010
The next generation of log and event management eliminates the complexity and bloat associated with traditional log and SIEM systems.
Tags : tripwire, log center, event management, siem system, compliance regulation, security event analysis platform, event database, integrated it security
     Tripwire, Inc
By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
     Venafi
By: VMware     Published Date: Dec 18, 2012
This whitepaper talks about the pressures that SMB is facing -including small budgets, limited skill sets among IT staff, and limitations in their existing processes.
Tags : smb, virtualization, cloud, server, security, automation, endpoint, application delivery
     VMware
By: Webroot UK     Published Date: Mar 22, 2010
The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats
Tags : webroot, web security service, cloud computing, web threats, business process automation
     Webroot UK
Start   Previous    1 2 3 4 5     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics