versiondog Switch Integration

versiondog Switch Integration as part of your Cybersecurity Strategy

Learn how to use versiondog switch integration to detect cybersecurity threats faster and easier.

versiondog Switch Integration

Data Management as part of your Cybersecurity Strategy

Cybersecurity is one of the central topics in industrial automation. Although versiondog does not directly repel cyberattacks, it helps customers to detect them early on. More importantly, it can significantly reduce the damage wrought by a cyberattack by quickly restoring the last unchanged, hence virus-free version.

In order to detect cyberattacks early on, it is essential that you are able to track changes to all control programs and production data. It is also imperative that you are able to identify any unauthorized program changes immediately. All of this is possible with AUVESY’s data management and software solution, versiondog. With versiondog, you can quickly see WHO changed WHAT, WHEN, WHERE, and WHY (from the current version all the way back to the first version). What is more, a configurable alarm alerts you when discrepancies are found.

If a cyberattack has already taken place, the fastest solution is to quickly find and restore a previous, virus-free version. It stands to reason that if you make regular backups you reduce the likelihood of data loss. Regular backups also allow you to perform rapid restoration, whereby maintenance staff can take an error-free backup from the server archive and immediately restore it. This process is also known as disaster recovery. In the versiondog world, disaster recovery is made much faster thanks to the data management and software solution’s ability to schedule automatic backups and to precisely compare versions with SmartCompare. versiondog’s ability to restore a previous, virus-free version of an automation device, and thereby return it to the state that it was in before the cyberattack, prove that versiondog has the potential to function as part of an effective cybersecurity strategy.

The Honeypot Scenario

Industrial networks are very complex. They are often structured into several hierarchical levels and have a clearly defined communication protocol to successfully facilitate the management of data streams and tasks. At the field or machine level, there are switches which are connected to terminal equipment (such as controllers, field devices and HMI panels) via an Industrial Ethernet protocol (e.g. PROFINET). Switches frequently account for the earliest targets of a cyberattack due to their ability to access automation devices via ports. If a port is opened or closed as a direct result of a cyberattack, the connection to the terminal device can be severed or unauthorized access to a device can be granted. Both outcomes can put enterprises, people, and the environment at great risk. How does one go about preventing them?

One well-known example of a successful defense in depth strategy is the honeypot. Honeypots are used to detect (early threat detection and new threat detection), prevent, deflect, and counteract malware. One way of doing this involves installing and configuring a switch in an industrial network. The honeypot (in the context of this scenario, a switch) has no real function, it only mimics the behavior of a production resource as accurately as possible to appear attractive to unauthorized entities. The honeypot administrator should not make any changes to the switch, but simply monitor it for any unauthorized changes. Enter versiondog. versiondog checks whether there were unauthorized changes made and sounds an alarm when discrepancies are found. This then allows for authorized personnel to react and prevent the potential consequences of a cyberattack. By using versiondog to schedule regular, automatic backups, you can monitor the configuration data of the switch and immediately detect unauthorized changes.

honeypot scenario graphic

How does versiondog help you to safeguard your data?

  • versiondog allows you to cyclically and automatically verify authorized control program versions.

  • Perform multiple checks daily.

  • Get alarm notifications.

  • Quickly comprehend differences through text-based and/or graphical display.

  • Suitable for use with the vast majority of automation devices and systems.

  • versiondog detects changes to control programs and displays them.

  • versiondog monitors the system configuration of Windows and Linux based systems.

  • versiondog ensures that versions cannot be subsequently changed.

  • versiondog quickly finds and restores a previous, error-free version.

versiondog Switch Integration

Integrating switches with versiondog can help improve your cybersecurity strategy. Do you have more questions about versiondog switch integration? Our team would be happy to answer them.

Ask us more

versiondog Add-Ons and Features

Learn more about the other versiondog Add-Ons and Features to help you reduce downtime and avoid data loss.

Read More

Industry Blog

Read about the latest industry news, tips for using versiondog to its fullest potential, and other helpful information for versiondog Users.

Read More

Sign up for our Newsletter

Get the latest versiondog updates, industry news, and events sent straight to your inbox.

Sign Me Up

Sign up for our Newsletter

Get the latest versiondog updates, industry news, and events sent straight to your inbox.

Sign Me Up