• North America

     

  • North America

     

  • North America

     

  • North America

     

  • North America

     

  • North America

     

  • North America

     

Security

Critical infrastructure must continually operate with a zero down time policy, maintaining reliability and availability while ensuring safety of workers and health of the system. Operational system complexity, interconnectivity, exponential increases in intelligent field devices, and increasingly demanding regulatory requirements have put intense pressure on operations staff tasked with keeping their production assets and systems up and running. To compound matters, cyber attacks targeting critical infrastructure and control systems have increased dramatically. Solutions to these challenges must address security, compliance, and change management activities holistically due to the interconnectedness that exists among them.


EnergyAxis: A key competitive differentiator of EnergyAxis is its intrinsic architectural support for security. Because Elster designed security into EnergyAxis System from the beginning, we can seamlessly add and enable security enhancements to the system without costs or impact to system performance.


Elster takes a comprehensive end-to-end approach to security to provide confidentiality, integrity, availability, and auditability within the utility’s network. The EnergyAxis architecture improves security by distributing it throughout the system, rather than maintaining all access at a single centralized site.


Elster’s multi-pronged approach includes:

  • Access and Authorization–The EnergyAxis Management System (EA_MS) supports role-based users, so that only users with certain levels of authority can perform specific tasks. The system also supports both MAC and IP address access control lists. 
  • Authentication–Limits transmissions on the network to authorized devices and personnel only. EnergyAxis currently uses sophisticated authentication techniques and enhances these techniques by utilizing unique keys for each device.
  • Information Security–Provided through the use of AES-128 encryption and authentication on each section of the communications network with individual managed keys per device. Information security is further enhanced through the use of auditing and logging of all system activities and data manipulation, guaranteeing non-repudiation of all system information.
  • Data Integrity and Encryption–Ensures that the information generated and passed through the system has not been changed or altered in transit – either accidentally or intentionally. EnergyAxis uses NIST-approved encryption modes and algorithms including AES-128. 
  • Monitoring and Reporting–The utility receives notification in the case of a security breach. EnergyAxis provides security audit logging and reporting to allow early detection of any security issues. The Elster solution also enables the integration of third party Intrusion Detection and Prevention systems.

Elster strongly believes security is an on-going, never ending development that will be invested in, developed, and tested release over release.

Industrial Defender stackable answer for Security: Industrial Defender is the global leader in security, compliance, and change management solutions for industrial control systems (ICS).


Industrial Defender’s solutions position ICS professionals to achieve their goals and improve KPI’s through common data analysis, processes, and technology infrastructure across security, compliance, and change management activities. Industrial Defender’s Automation Systems Manager (ASM) solutions ensure the availability, reliability and security of critical infrastructure.


ASM provides a single, unified view into heterogeneous automation systems, including legacy systems.  Solutions combine technology products specifically designed to meet the unique needs of ICS environments with services performed by domain experts. ASM provides valuable information that would otherwise be unavailable, eliminating redundancy, saving valuable man hours, all while improving business efficiency and customer responsiveness. Learn more>>