Additional information
Source: Web-site of vendorThe project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
The project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
The following challenges of the Industrial Internet of Things (IIoT) needed to be addressed:
Complete transparency of all assets and communications
Enhance cyber security and reduce overall risk
Solution
Rhebo Industrial Protector seamlessly and non-intrusively monitors the communication within the ICS. The automatic anomaly detection system provides notification of events that may lead to disruptions or decreased overall system performance. Such anomaly notifications include both security incidents and technical malfunctions that can occur in the day-to-day operation of automated IIoT systems. Ultimately, Rhebo Industrial Protector ensures the reduction of downtime risks, increases the overall equipment efficiency (OEE) and thereby assures productivity. Rhebo Industrial Protector was installed at the automobile manufacturer as a pilot within a production cell with about 300 networked assets including various devices and logical hosts. The solution was centrally deployed via mirror ports and met the core requirement of non-intrusive monitoring for avoiding malfunctions due to false-positive alerts and software updates. The installation and commissioning did not interrupt the production at any time and the first results including actionable notifications were already available within a few minutes.
Outcomes
The automobile manufacturer achieved complete transparency within the monitored ICS domain through the use of Rhebo Industrial Protector. The manufacturer gained a clear and detailed identification of any misconfigurations and potential security threats within the ICS through anomaly notifications prioritized by risk scores. The pilot project laid the foundation for the use of automatic anomaly detection ensuring a disruption-free and continuity-assured automated production.
Ensure Security and Business Continuity
Centralize management
Manage Risks
No centralized control over IT systems
No control over the state of communication channels
IT infrastructure downtimes
Decentralized IT systems