Active Protection
The primary aim of PLC Guard™ is to protect PLC controllers from unauthorised changes. This principle addresses the majority of cyber attacks and unintentional harmful actions in industrial environments.
By enforcing deterministic, policy-driven control at the network level, PLC Guard ensures that only authorised communications reach critical control devices — and that every interaction is visible, governed, and traceable.
Typical Plant Protection Offering
Authorised Communication Control
- Allows only authorised hosts to communicate with PLCs
- Allows only authorised commands and setpoints through DPI (Deep Packet Inspection)
- Controls remote access to PLCs — when, who, why, what, where
- Prevents unauthorised upgrades of firmware and software on PLCs
- Stops unauthorised traffic from the Enterprise network to SCADA, Engineering stations, and PLCs
Threat and Vulnerability Detection
PLC Guard detects threats and vulnerabilities inside the network traffic, including:
- Outdated PLC firmware — First Watch® detects all PLCs connected to the network passively from the traffic, identifies firmware revisions, and detects vulnerabilities
- Outdated devices, machinery, controllers, and software — these components are seriously vulnerable and can be harmed by modern technologies; all monitoring methods must be discussed before the actual implementation is started
- Unclear separation of IT and OT networks — traffic between production hosts and the rest of the world is carefully monitored, and unauthorised connections are detected
- Lack of network access control — new devices connected to the network are detected
- Lack of encryption — detailed analysis detects plaintext passwords in the traffic
- Insecure protocols — insecure protocols are detected and reported
- Insecure connections to devices and machinery — all insecure connections, such as HTTP connections to PLCs, are detected
- Operational activities with PLCs and specialised equipment — sensitive operations such as firmware updates, software download/upload, setpoint read/write, stop/start, and elevated connections are detected and reported
- Internet connection from/to OT environment
- Network scanning from an unauthorised IP address
- Malformed packets
- Unusual IP addresses
- New device connected to the network
- TCP SYN flood attacks detected through failed network connections