![ELKHART BRASS 65765001 Manual Download Page 12](http://html1.mh-extra.com/html/elkhart-brass/65765001/65765001_manual_2393104012.webp)
eWON Layered Security Approach |
© 2014 eWON Inc. This document is property of eWON Inc.
3
The eWON Security Approach
Using a defense-in-depth approach based on guidelines set forth by ISO27002, IEC
62443-2-4 and NIST Cyber security Framework 1.0 in addition to numerous other
publications, guidelines and industry best practices, eWON developed a managed,
hybrid, layered cyber security approach to protect its devices, network and most
importantly, its customers’ industrial control systems.
Talk2M Network Infrastructure:
Globally redundant Tier 1 hosting
partners, 24/7 monitoring, SOC
1/SSAE 16/ISAE 3402 Data
Centers, ISO270001, CSA
Management & Accountability:
Unique user logins, configurable
user rights to different devices.
Connection audit trail. Double
factor authentication.
Encryption:
VPN sessions are end-
to-end encrypted using SSL/TLS for
session authentication and IP SEC
ESP protocol for tunnel transport
over UDP and TCP/IP
Application:
IP, port, and protocol
filtering/firewalling available.
Restricted access granularity
based on user, group, site for all or
single devices or specific port.
eWON Device:
Network
segregation, local device
authentication, physical switch for
enabling/disabling
access.
Policies & Procedures:
eWON/Talk2M solution enhances
and is compatible with existing
corporate security policies,
firewall rules, and proxy servers.
Policies &
Procedures
Talk2M Network
Infrastructure
User Management
& Accountability
Encryption
Application
eWON
Device
eWON, the global leader in secure
industrial automation remote access,
considers device and network security to
be a core competency fully integrated at
every level within the framework of our
solution.