Select Page

How Logitek Implements In-Depth Defense

Logitek, as a technology provider focused on OT environments, offers different complementary solutions that allow implementing the defense-in-depth strategy in industrial or critical infrastructure en...

defense in depth perimeter security

In this post on our Industrial Cybersecurity website, the principles of the defense-in-depth strategy are explained as a strategy to minimize the probability that a cybersecurity threat may materialize, applying several layers of protection to assets.

Logitek, as a technology provider focused on OT environments, offers different complementary solutions that allow implementing the defense-in-depth strategy in industrial or critical infrastructure environments.

Perimeter Defense

Next-Gen Firewalls for perimeter protection and to secure external remote access with two-factor authentication.

Internal Network Defense

  • Industrial network electronics, highly configurable, with the ability to control network access, implement NAC (Network Access Control) as well as implement scalable and highly available network architectures.
  • Network infrastructure monitoring systems to verify that all equipment and its links are in a correct state.
  • Non-intrusive systems for monitoring industrial network traffic and IDS, providing cyber resilience and deep visibility of industrial control systems (ICS) and SCADA networks by analyzing network traffic and detecting anomalous communications.

Equipment Defense

  • End-point protection systems (workstations and servers) to prevent both malware infection and targeted attacks, even if they are not patched.
  • Solutions to prevent the execution of unauthorized applications.
  • Centralized management of the defense of all equipment.

defense in depth and equipment defense in cybersecurity

Application Defense

  • Systems for analyzing CPU instructions and memory positions that are used in the lawful execution of critical applications. Detection and blocking of attempted execution of other execution flows (for example, by malware or attacks, known or unknown).
  • Systems without false positives and without the need for updates.

Data Defense

  • Systems for version control and automated storage of PLC’s backups and Wonderware System Platform objects.
  • They offer traceability and reversibility of the changes suffered in PLC or SCADA

For more information on each of the layers, you can visit:

How Logitek implements perimeter defense