Industrial Control Systems (ICS) Security

Protect industrial equipment, networks, and management systems, including automation equipment, Programmable Logic Controllers (PLC), and factory robotics.

Security for Industrial Control Systems (ICS)

Over a billion IoT devices protected

As the connectivity of Industry 4.0 drives tremendous progress for manufacturing, process control, infrastructure, and countless other Industrial Control Systems (ICS), threats targeting these systems are on the rise. Increased system connectivity comes with increased risk, but Symantec security solutions help you protect your factories, refineries, and infrastructure by embedding security directly into your industrial equipment, and helping you better monitor industrial networks for such threats. Symantec has both solutions for operators looking to secure their plants and infrastructure, as well as solutions for equipment vendors looking to increase the security of their products.

Security for Industrial Control Systems (ICS)
Proven Technology, Adapted for ICS

Proven Technology, Adapted for ICS

Protect your ICS with solutions from the world’s most comprehensive portfolio of security technologies–technologies that protect a billion devices and trillions of dollars. Detect advanced threats with analytics technologies designed for networks that depend on proprietary industrial protocols. Secure industrial equipment with specifically designed embedded solutions.

  • 10 trillion security events analyzed annually
  • Certificate Authority for over a billion IoT devices
  • Unmatched threat protection technologies

Increasingly Serious Threats

ICS attacks are serious and consequential. A steel mill in Germany suffered blast furnace damage. Power grids in Ukraine crashed. And ICS attacks are on the rise. In 2014, there were 245 attacks in the U.S. alone. With roughly one third of ICS operators reporting attacks, the question is not “if”, but “when."

Increasingly Serious Threats

Secure Your Network

Simpler encryption key management for ICS protocols

With world-leading key management infrastructure you can:

  • Leverage authentication to prevent unauthorized access
  • Safely and effectively restrict access
  • Block rogue devices
  • Never trust unauthenticated connections
  • Never trust unauthenticated data
  • Tunnel vulnerable proprietary protocols over mutually authenticated connections with RSA, ECC, SSL, or TLS encryption.
Secure Your Network

Authenticate Your Devices

1 billion Internet of Things (IoT) devices. Hundreds of IoT manufacturers. Trillions of dollars in financial transactions. That’s how Symantec’s key management infrastructure scales.

Our solutions cover everything from consumer goods and smart meters to cellular base stations and aviation systems. We’ve worked with partners on in-factory key injection as well as on real-time notarization of keys generated in-device or in-factory.

  • Protect “device to cloud” links with scalable key management
  • Enable secure communications among your devices
  • Make different vendors in big ecosystems interoperable.
Authenticate Your Devices
Control your Devices with Signed Code

Control your Devices with Signed Code

Never trust unsigned code. Never allow your devices to run unsigned code. Ensure compliance and simplify key management for code signing with Symantec Code Signing Certificates, or utilize cloud-based “code signing as a service” Secure Application Service.

We have updated our Privacy Policy which can be found here.