Skip Ribbon Commands
Skip to main content

Production Security

NNIT secures your supply chain

Great many production environments struggle with an increasingly complex IT platform and IT landscape. Old un-supported or proprietary solutions, which were designed and implemented in a different age, have been connected to the company network, thus introducing new risks to the production-lines in the supply chain. Furthermore, the threat landscape has changed, and the supply chains are under direct attack. NNIT can help you to address these threats without disturbing the supply chain.

ICS/OT (Industrial Control Systems/Operational IT)
Industrial control system (ICS) is a general term that encompasses several types of control systems used in industrial production, such as manufacturing, electrical, water, oil and gas. 
As the potential attacks on operators of ICS (Industrial Control Systems) are being increasingly linked to international cyber criminals, security practices within private companies are becoming more important and practitioners must scrutinize their operations in order to minimize their exposure to attacks.

We are ready to assist you
NNIT can assist you with crafting an OT-security strategy, designing the OT-security architecture, furthermore translating the high level guidelines into practical and affordable security installations.

NNIT offers various OT security advisory services. All with root in industry recognized standards such as ISA-99/ IEC62443 and NIST SP800-53/82. Also, the frameworks are combined with our vast experience from actual implementations.

 


 

 

 

Lars Koch Hviid+4530758399LKHV@nnit.com​​​​​Senior IT Security Architect https://dk.linkedin.com/in/larshviidLars Koch Hviid

 

 

Breach Preparednesshttp://www.nnit.com/OfferingsAndArticles/Pages/Breach Preparednes.aspxBreach Preparedness
Security Advisoryhttp://www.nnit.com/cybersecurity/Pages/security-advisory.aspxSecurity Advisory
Security Assessment: Striking the Right Security Balancehttp://www.nnit.com/OfferingsAndArticles/Pages/Article-Cybercrime.aspxSecurity Assessment: Striking the Right Security Balance
NNIT Security Insightshttp://www.nnit.com/cybersecurity/Pages/security-insights.aspxNNIT Security Insights
Secure web applications: 3 common mistakes that are easy to fixhttp://www.nnit.com/OfferingsAndArticles/Pages/Secure web applications - 3 common mistakes that are easy to fix.aspxSecure web applications: 3 common mistakes that are easy to fix
Till the next WannaCry campaignhttp://www.nnit.com/OfferingsAndArticles/Pages/Till the next WannaCry campaign.aspxTill the next WannaCry campaign
The Devil is (often) in the Softwarehttp://www.nnit.com/OfferingsAndArticles/Pages/The Devil is (often) in the Software.aspxThe Devil is (often) in the Software
Cybersecurity Awareness – The First Line of Defense​http://www.nnit.com/OfferingsAndArticles/Pages/CybersecurityAwareness.aspxCybersecurity Awareness – The First Line of Defense​
Cybercrime Affects All of Ushttp://www.nnit.com/OfferingsAndArticles/Pages/NNIT_Cyber-Crime-Affects-All-of-us_EN_Article.aspxCybercrime Affects All of Us
Implementation Partner for EU GDPRhttp://www.nnit.com/OfferingsAndArticles/Pages/Implementation-Partner-for-EU-GDPR.aspxImplementation Partner for EU GDPR