Plant Security

What is Yokogawa’s lifecycle approach for Cybersecurity Management?

We are in a new age of controlling cybersecurity risks. The way we work is changing. The connectivity is increasing, and the cybersecurity threat landscape is changing with it. To help our customers continue their industrial operations safely and securely, Yokogawa provides comprehensive cybersecurity solutions and services based on defense in depth strategy. We focus on delivering long-term lifecycle services while understanding customers' challenges and working continuously for improvements in a close partnership. Yokogawa follows one overall objective: to minimize risk and maximize corporate values according to our self-commitment as a lifecycle value partner. Yokogawa aims to become your #1 trusted partner and achieve long-term, stable, and secure operations.

Yokogawa is seeing customer's plants as important as a human body.

Yokogawa’s comprehensive Cybersecurity Consulting Services help customers deploy proper security solutions for their plants to ensure safe operation while adapting to new technology for achieving higher efficiency and productivity.

Secured and controlled access to critical, actionable data at any time and from anywhere.

Yokogawa has established the basic policy and measures criteria for the security control of products. 

Overview:

At the 2015 ARC Industry Forum in Orlando, Florida in February, Yokogawa announced a collaboration with Cisco to deliver Shell’s SecurePlant initiative, a comprehensive security management solution for plant control systems jointly developed by Cisco, Yokogawa, and Shell. This report explains how Cisco Systems and Yokogawa worked with Shell to co-develop the company’s “SecurePlant” cybersecurity solution for its control systems.

Overview:

Network and system security is now a necessity in process automation industry. YOKOGAWA provides a service lifecycle solution for cyber security to ensure that the security measures and deployments are continuously enhanced, monitored and inspected.

This white paper explains the details of the security design, implementation, operation and validation solutions from the technical perspective.

Overview:

Watch for a backdoor cyber security assualt. The Juniper Networks incident in December 2015 changed how industry looks at device security as hackers exploit deliberate weaknesses being installed into software. End users, integrators, and device manufacturers need to adapt and prepare for this new reality. Follow these cyber security steps.

Overview:

Supervisory control and data acquisition (SCADA) systems have been part of the process industries for many decades and cyber security measures need to grow as technology advances. SCADA systems are used in oil and gas pipeline and other remote control and monitoring applications, such as electrical transmission and distribution, and water/wastewater.

Industries:

Webinars

    Overview:

    With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe.

Looking for more information on our people, technology and solutions?


Contact Us
Top