Most computers have some kind of antivirus software today, but protecting control systems from hackers requires a completely different approach. We have created a new layer of security protection called “Digital Ghost.” This software layer is the industrial version of an immune system, an invisible presence in machines that keeps watch 24/7. It uses sensors and controls to detect, locate and neutralize threats much like the body responds to viruses. Digital Ghost is a system level application that runs on GE’s secure operating system and uses information about the system, machines, actuators, sensors, and the control systems to be more sensitive to early warning signals and increase its ability to detect a broader range of attacks.
A digitized infrastructure requires a digital highway through which electronic data can be transmitted seamlessly and securely in to and out of industrial and manufacturing plants. We have created a product called i-TAG that is a first-of-its-kind hardware/software solution that not only makes data transfer more seamless, it tightens security by allowing customers to see and isolate who is sending data. i-TAG is an industrial Trusted Asset Gateway and allows you to securely manage the flow of IoT information generated in the manufacturing plant. i-TAG has strong isolation of the remote user, positive control to monitor and terminate remote access, 2 factor authentication, small footprint, is stand alone, and designed for NERC/CIP compliance.
- Understand security risks to plants and equipment
- Understand current state of the art security approaches
- Understand i-TAG and the Digital Ghost software
Why Is It Important?
Assuring that part description information or the physical part has not been compromised is critical or can be safety critical. We will present technologies that will protect manufacturing machines and processes against hacks and allow a manufacturing plant to receive and transmit data to remote locations.