Making Industrial IoT and Smart Buildings Cyber Safe
Veridify's cybersecurity uses technology from Intel and industrial computing hardware from Advantech. Veridify and Advantech were invited by Intel to participate in Intel's "Scaling at the Edge" video series.
Watch Video (10 min) | View Slides
Watch our more detailed webinar on the same topic.
Video Transcript
00:03
Welcome to the Intel scaling at the edge video series. In this video, we'll learn how the DOME Solution by Advantech and Veridify Security is helping to make industrial IoT (and smart buildings) cyber safe. Joining us is Carolyn Swann, Director of Partnerships for Advantech's IIoT group and Louis Parks, CEO of Veridify Security. Carolyn and Lewis take it away. We're so glad you joined us today. Advantech has been working with our partners Intel and Veridify, securing the edge of the Internet of Things otherwise known as
00:37
the IoT. As we enable an intelligent planet, we bring our global industrial I.T Solutions with edge computing, remote sensors, and IoT gateways with 1500 standard product offerings. As a global industrial computer company, for four decades now we have been helping original equipment manufacturers create solutions that solve some of the world's toughest challenges. Intel and Veridify are important Partners to how we go to market and bring these Solutions. Louis you want to share some of the stories of how we've
01:12
been working with Intel and transforming the security at the edge? Sure, thank you Carolyn. I'm Louis Parks and the CEO of Veridify. I've been very fortunate to be here for our journey in terms of marketing solutions and security that we've been bringing to the IoT and operational technology, or OT, edge devices now found in Smart Buildings and Industrial IoT. For many years we've worked on future-proof tools and software development kits or SDKs which has brought us to the product today DOME that we'll be sharing with you, developed
01:47
with our partners Intel and Advantech. We bring these market-ready solutions, specifically focused on solving cyber security issues in the market, and many of our products have received recognition from industries today. Very specifically why don't we start with the discussion about why we're on this video and why we're talking about cyber security in OT, or operational technology networks. I think one of the first issues that many of you would be familiar with is that OT networks are often dealing with
02:18
legacy infrastructure. Not the last revision or update of an operating system but years or decades of being in the field, making protecting these network devices very difficult. Furthermore, many devices are proprietary and specific to a manufacturer or an industry, making a single security platform difficult to implement. On top of which, even when there are several systems in a building or in an industrial site, you may find different or multiple protocols produced over the years even among floors in a single building.
02:52
Many of these devices at the edge have limited compute or processing capability, making putting security on them even more difficult. And again, multiple vendors in the same site create several barriers or hurdles in terms of finding a single system to apply. Finally, even when you do connect to these devices, managing them at the edge can be very difficult. As you can see on the right hand side in the diagram, with all of these challenges in OT, or operational technology networks, pictured in blue. Once you connect them to IT
03:29
networks or the IoT, basically you open the door to several cyber security attacks. There are existing cyber-solutions today, many of which are focused on asset visibility, monitoring, and remediation in the sense of protecting areas of the network. But, oftentimes these require significant IT input, they are hard to implement, and they only provide some protection to the network or the installed solutions. Why don't we take a look today at a network found in a typical building and how we together with our partners are protecting and help stop cyber attacks.
04:07
Pictured here is a typical building management system running on a building protocol called BACnet or BACnet/IP. On the left hand side is the building management system, and on the right hand side are devices you would find at the edge. And as you can see there is really no security in a building today. What we've done with our partners very specifically is built and easy to implement, low-cost solution that is packaged in a box ready to go into the environment pictured here.
04:40
Specifically we'd like to talk about the three areas that we've addressed, Carolyn. The foundation of the DOME security solution is the Intel latest generation compute platform. This is the DOME Interface Appliance (DIA), it acts as the DOME server whether connecting to the cloud or on premise. The Advantech UNO 2271 runs on the Intel Celeron or the Intel Pentium processor. As you can see this is a very lightweight, compact industrial computer. It is a long life cycle computer and it's family can be installed in any smart space or building and it serves as
05:25
the server for the DOME Sentries and the edge component in the DOME cyber security solution. So as Carolyn pointed out, and we want to emphasize here, a single DOME Interface Appliance on an UNO installed in a building immediately provides help for cyber protection. In conjunction with that our DOME Sentries are individual devices that can be installed in front of one or many installed solutions, and immediately create a secure tunnel over the existing network. You're not replacing anything at your customer sites, you're not replacing
06:01
any of the equipment. This solution retrofits cyber security to the existing platform in a matter of minutes. Very specifically we've packaged the solution to make it easy to use and deliver. It comes with a DOME SaaS Dashboard where analytics on the application and the cyber security being provided can be seen. Security alerts can be seen here or via email or text as well as receiving daily statuses. And speaking to the ease and simplicity of the deployment of the DOME solution, the DOME interface, the Advantech UNO 2271,
06:41
as the site manager and gateway, comes together with the DOME Sentries managing that cloud connection or on premise for device management, credential management and the data logging capture. And as we've said, combined with the DOME interface Appliance from Advantech, we have the DOME Sentry, a cyber security appliance that will work with installed devices. It helps stop cyber attacks based on NIST's Zero Trust framework, where every data packet is authenticated and encrypted running over the public platform or BACnet network.
07:16
The device, when powered up, discovers behind it the installed devices and puts itself on the network correctly credentialing itself for security. Whitelisting enables you to identify what devices should be spoken to and what devices cannot speak to each other. And again, for maximum flexibility you can use a DOME Sentry to protect a pre-existing device installed in a building or an industrial network, or use it to protect many devices installed in a building or industrial network.
07:46
As we've used today as our specific example buildings, DOME helps protect a wide range of buildings both in commercial, government, and retail. There are of course very special requirements in some of the government and DOD applications which we address with the DOME platform. So in summary today, the key benefits of the DOME cyber security solution is first and foremost not, only does it help stop cyber attacks, but it provides real-time active protection. Real benefit based on NIST's Zero Trust framework and based on the long life cycle of the Intel platforms.
08:27
It's a fully packaged cyber security solution where no IT expertise is needed, so instead of having to have a full team of IT experts deployed out there in the field you're able to deploy the DOME solution easily efficiently and plug it in and get it up and running protecting your networks within minutes. And again, we have Advantech has chosen Intel as our partner for the long life cycle and the industrial environments that the DOME devices being deployed in.
09:00
It works with new and existing OT devices. We know there are thousands, millions of legacy edge devices out there. The protection between the devices to the edge, and the immediate protection upon installation with the DOME cyber security, is one of the easiest and simplest deployments that you can take with your operational technology team. Thank you so much for spending the time with us today. Please reach out to your Intel or your Advantech representative, you can go to the Intel IoT RFP Ready Kit (RRK) on the Intel Marketplace.
09:38
And to schedule a solution review or a demo, please contact Veridify directly. Thank you so much for helping us help you stop cyber attacks before they can happen. Louis, we're so grateful you joined us today. Thank you Carolyn, and hopefully everybody will take away, that with our partners Intel and Advantech, we've put cyber security in an easy to install box that helps stop attacks before they can happen. Thank you.