Skip Ribbon Commands
Skip to main content

Production Security

NNIT secures your supply chain

Great many production environments struggle with an increasingly complex IT platform and IT landscape. Old un-supported or proprietary solutions, which were designed and implemented in a different age, have been connected to the company network, thus introducing new risks to the production-lines in the supply chain. Furthermore, the threat landscape has changed, and the supply chains are under direct attack. NNIT can help you to address these threats without disturbing the supply chain.

ICS/OT (Industrial Control Systems/Operational IT)
Industrial control system (ICS) is a general term that encompasses several types of control systems used in industrial production, such as manufacturing, electrical, water, oil and gas. 
As the potential attacks on operators of ICS (Industrial Control Systems) are being increasingly linked to international cyber criminals, security practices within private companies are becoming more important and practitioners must scrutinize their operations in order to minimize their exposure to attacks.

We are ready to assist you
NNIT can assist you with crafting an OT-security strategy, designing the OT-security architecture, furthermore translating the high level guidelines into practical and affordable security installations.

NNIT offers various OT security advisory services. All with root in industry recognized standards such as ISA-99/ IEC62443 and NIST SP800-53/82. Also, the frameworks are combined with our vast experience from actual implementations.

 


 

 

 

Lars Koch Hviid+4530758399LKHV@nnit.com​​​​​Senior IT Security Architect https://dk.linkedin.com/in/larshviidLars Koch Hviid

 

 

Security Advisoryhttp://www.nnit.com/cybersecurity/Pages/security-advisory.aspxSecurity Advisory
EUGDPRhttp://www.nnit.com/eugdprEUGDPR
NNIT Security Insightshttp://www.nnit.com/cybersecurity/Pages/security-insights.aspxNNIT Security Insights
Identity and Access Management Consultancyhttp://www.nnit.com/OfferingsAndArticles/Pages/-Identity-and-Access-Management-Consultancy.aspxIdentity and Access Management Consultancy
Steps to protect you and your organization from Phishing - yes, we need protection, all of us!http://www.nnit.com/OfferingsAndArticles/Pages/steps-to-protect-you-from-phishing.aspxSteps to protect you and your organization from Phishing - yes, we need protection, all of us!
What to watch out for in IT Security for 2017http://www.nnit.com/OfferingsAndArticles/Pages/what-to-watch-out-security-2017.aspxWhat to watch out for in IT Security for 2017
Identity and Access Management becomes a top priority due to the EU GDPRhttp://www.nnit.com/OfferingsAndArticles/Pages/Identity-and-Access-Management-and-EUGDPR.aspxIdentity and Access Management becomes a top priority due to the EU GDPR
Control Your Security & Privacy in the Cloudhttp://www.nnit.com/OfferingsAndArticles/Pages/Control-Your-Security-Privacy-in-the-Cloud.aspxControl Your Security & Privacy in the Cloud
Perfect Security?http://www.nnit.com/OfferingsAndArticles/Pages/Perfect-Security.aspxPerfect Security?
Implementation Partner for EU GDPRhttp://www.nnit.com/OfferingsAndArticles/Pages/Implementation-Partner-for-EU-GDPR.aspxImplementation Partner for EU GDPR