0% found this document useful (0 votes)
20 views8 pages

Moxa Cybersecurity Case Studies

1) A global manufacturer suffered a large cyberattack that forced them to spend significant resources to restore operations. They are looking for solutions to enhance operational resilience against cyberattacks at their South Asia branch office. 2) A leading relay manufacturer in China needs a comprehensive and future-proof networking solution for their new plants with large-scale networks across four buildings and 46 production lines. Network availability is the top priority. 3) A U.S. data center provider wants to increase cybersecurity to prevent data loss and penalties, and protect OT devices with communication interfaces from cyberattacks. They need to perform monthly vulnerability scans and mass firmware updates across thousands of devices.

Uploaded by

Nhat Tan Mai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views8 pages

Moxa Cybersecurity Case Studies

1) A global manufacturer suffered a large cyberattack that forced them to spend significant resources to restore operations. They are looking for solutions to enhance operational resilience against cyberattacks at their South Asia branch office. 2) A leading relay manufacturer in China needs a comprehensive and future-proof networking solution for their new plants with large-scale networks across four buildings and 46 production lines. Network availability is the top priority. 3) A U.S. data center provider wants to increase cybersecurity to prevent data loss and penalties, and protect OT devices with communication interfaces from cyberattacks. They need to perform monthly vulnerability scans and mass firmware updates across thousands of devices.

Uploaded by

Nhat Tan Mai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Case 1

Factory Automation:
Assembly Lines Protect Assembly Lines From Cyberattacks

Introduction
• A global manufacturer suffered a large cyberattack and was forced to spend
significant resources to get its plants back to normal. It caused not only a fall in
profitability but also damage to its reputation.
• In order to achieve continuous industrial operations, the company needs its
networks to be very resistant to disruptions and cyberattacks.
• To be able to prevent cyberattacks, its branch office in South Asia started to look
for solutions that can enhance their operational resilience against cyberattacks.

Challenges
• Any new measures that are implemented must not interrupt existing operations.
Location: South Asia • How to efficiently manage all devices and monitor all security incidents across 20
production and assembly lines.
Factory Automation:
Assembly Lines Solution and Results
We suggest tackling the challenges from the perspectives of networking and network
protection.
Expert Advice • To ensure maximum network uptime, Moxa’s Turbo Ring features network recovery
In order to protect networks and times within 50 ms.
devices, a network design should • Moxa’s industrial Intrusion Prevention System (IPS) devices, EtherCatch, help monitor
ensure maximum network uptime malicious network behavior.
and utilize a central management
tool that can remotely configure • With MXview and Security Dashboard Console (SDC), customers can remotely and
and update all devices. centrally manage all network devices and trace security incidents.
Case 2
Factory Automation:
Production Lines Build Future-proof Network Security

Introduction
• A world-leading relay manufacturer in China is building new plants to upgrade its
production lines to ensure they are ready for Industry 4.0 applications.
• In light of increasing ransomware attacks and government regulations, the
company would like to build a solid foundation for its plant networks to get ready
for the future.

Challenges
• The new plants are located across four buildings. There are 46 production lines
Location: China and each line includes 60 devices. Due to the large-scale networks, the company
needs a comprehensive and future-proof networking solution.
• The components produced by the company play an essential role within the
global power generation supply chain. Any disruption to the production processes
would harm its reputation and bottom lines. Therefore, the company considers
network availability to be the priority for this project.
Factory Automation:
Production Lines Solution and Results
If you are considering the possibility of expanding in the future, we suggest building the
plant networks from the edge to the core.
Expert Advice • To ensure maximum network uptime, Moxa’s Turbo Ring supports network recovery
Understand your critical assets times within 50 ms. In addition to network redundancy, Moxa’s switches offer robust
and divide them into zones security features to ramp up network security.
based on your security policy so • Moxa’s industrial Intrusion Prevention System (IPS) firewalls, EtherFire, offer a high level
that you will have a better idea of protection against cyberthreats from the core level network to the edge networks.
about how to balance the cost
you can afford and the risk that • With MXview and Security Dashboard Console (SDC), customers can remotely and
you can accept even if you are centrally manage all network devices and trace security incidents.
managing a
large-scale network.
Case 3
Critical Power Monitoring:
Data Center Enhance Cybersecurity for a Data Center

Introduction
• A data center service provider located in the U.S.A. wants to increase their
cybersecurity because data centers are frequently attacked, which has resulted in
data loss and significant penalties over the past five years.
• It is now a corporate-level initiative because in addition to the server room being
attacked, the power sources that supply the server rooms have communication
interfaces that have also been identified as vulnerable to cyberattacks.

Challenges
• To manage security risks more efficiently, the corporation must perform a
Location: U.S.A. vulnerability scan monthly to prevent possible attacks and urge device
manufacturers to take action immediately when a vulnerability is identified.
• Cyberthreats are not the only problem that IT departments face. OT devices in
data centers such as switchgear, PDU, UPS etc., also have to be protected as the
circuit breaker, relay, and meters all have communication interfaces. There could
be thousands of these devices, which makes monitoring and updating firmware
troublesome.
Critical Power Monitoring:
Data Center Solution and Results
To reduce the chances of being hacked and suffering financial losses, any network node
should have embedded security functions to ramp up device security.
Expert Advice • Moxa’s MGate MB3170 and MB3660 protocol gateways were designed based on the
A network security plan with IEC 62443 standard, ensuring cybersecurity is embedded within the device.
proper device selection can • Frequently perform vulnerability scans to ensure the latest patch can be obtained by
greatly reduce the chances of users for critical applications that can be subjected to cyberattacks.
being hacked and losing money
or causing damage • Moxa’s MXconfig has an easy-to-use GUI and our MCC, which is a CLI tool that
to your companies’ reputation. simplifies performing configurations, makes it easier for both OT and IT users to make
mass firmware updates.
Case 4
Power & Energy:
Energy Storage Enhance Remote Connection Security for a Li-ion ESS

Introduction
• A grid-level energy storage system (ESS) builder developed their ESS using Li-ion
batteries. The batteries could be used multiple times before needing to be
replaced and there was good energy storage for multiple battery sizes.
• There are safety concerns about Li-ion batteries. When the battery is coming to
the end of its lifecycle, it requires constant monitoring to avoid a catastrophic
accident such as catching fire or exploding.

Challenges
• How to monitor the state of the batteries in the ESS in real time and have an early
Location: U.S.A. warning system to prevent the batteries from overheating and failing or even causing a
fire.
• As an ESS is commonly used with power grids, it is often targeted by hackers. It is
important that system integrators carefully select communication devices that have
higher levels of security protection such as HTTPS with TLSv1.2 to mitigate these risks.
• An ESS is often located in remote areas, which increases maintenance tasks, especially
in the event of an unexpected failure.
Power & Energy:
Energy Storage Solution and Results
To develop seamless and secure communications between an ESS and the control center,
we suggest a reliable edge connectivity solution deployed in between.
Expert Advice • MGate MB3170 protocol gateways facilitated communications between Modbus serial-
Remote communication requires based batteries and Ethernet-based RTUs.
a secure protocol such as • Security features such as HTTPS, SNMPv3 management, and Accessible IP Addresses
HTTPS or SNMPv3 to enhance to ensure the communication and access of the device is securely protected, reducing
your connectivity security when the risk and making remote communications more reliable.
using public networks.

You might also like