Attacks on production facilities, critical infrastructures (KRITIS) or devices that do not belong to classic IT are no longer dreams of the future, but reality in everyday manufacture business. According to a BITKOM study, every second company is now threatened by cyber attacks.
Industrial companies are particularly in focus here: Production systems have a longer life cycle. For example, the operating systems running on computers, are still in use for about 7 to 10 years after the official end-of-life. From this point on, no more security updates (patches, hotfixes, etc.) are provided. Hackers use these security gaps specifically to install malware on the client.
The effective combination of device and application control comprehensively protects the manufacturing process. All interfaces of the PCs involved in the manufacturing process are monitored or blocked. The same applies to the applications used. The machine learning algorithm automatically manages the local whitelist and controls the execution of applications. Nevertheless, service technicians must be able to install software updates, e.g. via the USB interfaces of the devices.
Simply plug in the USB stick and accept the usage guidelines. Now you can install applications on the production line in a defined time window. Machine Learning ensures that all executed and copied files are whitelisted.
If access to the USB interfaces is to be further restricted, maintenance can still be carried out efficiently via DriveLock SelfService.
Since all external drives are blocked, start DriveLock SelfService to allow access to the USB stick.
Deactivating the application control activates a learning mode. All executed and copied files are automatically whitelisted by DriveLock Machine Learning.
After software maintenance, the production line is secured again.
It is no longer possible to run unauthorized applications or use devices without explicit user authorization.
Optional: DriveLock can grant access to the same USB stick when a technician comes back for maintenance.
We will keep you up-to-date about current IT- and Cyber Security topics.