With EVE Protect, HAHN Digital offers a customized cyber security portfolio for manufacturing companies with industry-leading monitoring solutions. These solutions help companies manage their operational technology (OT) cyber security regarding detection, response, prediction, and prevention.
By connecting their production equipment and OT devices, manufacturing companies bring their IT and OT systems closer together. This connection is the first step towards realizing many valuable use cases in digital transformation. Nonetheless, entering the Industrial Internet of Things (IIoT) is accompanied by new cyber security threats. Unauthorized access to manufacturing networks, hacked production equipment, or read out data are only some of the examples that can lead to serious damage.
EVE Protect provides automatic and continuous analyses and assessment of OT and IoT equipment’s firmware. This solution system is based on the combination of two products of our partner company Cybellum: Cybellum V-Ray and Cybellum V-Monitor.
Manufacturing companies often integrate third party OT equipment to their facilities, their (local) IIoT network or even their products. However, insights to the providers’ software architecture are rarely provided. Without access to the source code of the built-in components, companies have to rely on the cyber security competencies of their providers. Therefore, it is difficult to run a comprehensive risk assessment.
Previous monitoring solutions like the manual verification and assessment of each component are not scalable in times of increasing networking and are merely a snapshot in the highly volatile environment of cyber security. If a device was secure before its integration into the equipment, new weak points or attack techniques can pose a threat to it afterwards. Only through the constant live monitoring of OT security, every deployed component can be protected from new threats. Machine learning helps the software to improve itself with every newly discovered or disclosed weak point. EVE Protect enables companies to act early on these issues instead of merely reacting to them.
Cybellum solutions provide the following joint advantages:
Cybellum V-RayTM offers complete transparency and risk assessment at the time of the integration phase based on an automated monitoring for weak point identification.
The monitoring software reconstructs and scans the OT/IIoT devices’ firmware for security weak points and threats, it imitates the approach of attackers, and provides a complete overview of the scanned device. This makes it possible to assess the risks of the new devices, to fix any issues and to safely integrate and release the device in the company.
The core competencies of Cybellum V-RayTM
Cybellum V-MonitorTM constantly monitors every scanned device for new weaknesses and threats from public and private sources. The monitoring software is integrated to the inventory management system: the platform automatically monitors new weak points and matches new cyber security risks with the available data from the devices. As soon as a security risk that needs attention occurs, Cybellum V-MonitorTM alerts the persons responsible.
The core competencies of Cybellum V-MonitorTM: