Skip Ribbon Commands
Skip to main content

Production Security

NNIT secures your supply chain

Great many production environments struggle with an increasingly complex IT platform and IT landscape. Old un-supported or proprietary solutions, which were designed and implemented in a different age, have been connected to the company network, thus introducing new risks to the production-lines in the supply chain. Furthermore, the threat landscape has changed, and the supply chains are under direct attack. NNIT can help you to address these threats without disturbing the supply chain.

ICS/OT (Industrial Control Systems/Operational IT)
Industrial control system (ICS) is a general term that encompasses several types of control systems used in industrial production, such as manufacturing, electrical, water, oil and gas. 
As the potential attacks on operators of ICS (Industrial Control Systems) are being increasingly linked to international cyber criminals, security practices within private companies are becoming more important and practitioners must scrutinize their operations in order to minimize their exposure to attacks.

We are ready to assist you
NNIT can assist you with crafting an OT-security strategy, designing the OT-security architecture, furthermore translating the high level guidelines into practical and affordable security installations.

NNIT offers various OT security advisory services. All with root in industry recognized standards such as ISA-99/ IEC62443 and NIST SP800-53/82. Also, the frameworks are combined with our vast experience from actual implementations.

 


 

 

 

Lars Koch Hviid+4530758399LKHV@nnit.com​​​​​Senior IT Security Architect https://dk.linkedin.com/in/larshviidLars Koch Hviid

 

 

Cyber Defense Centerhttp://www.nnit.com/cybersecurity/Pages/cdc.aspxCyber Defense Center
NNIT Security Insightshttp://www.nnit.com/cybersecurity/Pages/security-insights.aspxNNIT Security Insights
​​​Building a sustainable defence: How to secure your operational technology (OT) environment​http://www.nnit.com/OfferingsAndArticles/Pages/BuildingSustainableDefence.aspx​​​Building a sustainable defence: How to secure your operational technology (OT) environment​
Migrate to Cloud Services without Jeopardizing Security and Compliancehttp://www.nnit.com/OfferingsAndArticles/Pages/MigratetoCloudServices.aspxMigrate to Cloud Services without Jeopardizing Security and Compliance
​Privacy – why it is worth fighting forhttp://www.nnit.com/OfferingsAndArticles/Pages/Privacy.aspx​Privacy – why it is worth fighting for
​The C.I.A. of application security!http://www.nnit.com/OfferingsAndArticles/Pages/ApplicationSecurity.aspx​The C.I.A. of application security!
Cybersecurity Awareness – The First Line of Defense​http://www.nnit.com/OfferingsAndArticles/Pages/CybersecurityAwareness.aspxCybersecurity Awareness – The First Line of Defense​
The Fine Art of Aligning Business Strategy and Information Security Strategyhttp://www.nnit.com/OfferingsAndArticles/Pages/The-Fine-Art-of-Aligning-Business-Strategy-and-Information-Security-Strategy.aspxThe Fine Art of Aligning Business Strategy and Information Security Strategy
The security risks of black box technologyhttp://www.nnit.com/OfferingsAndArticles/Pages/The-security-risks-of-black-box-technology.aspxThe security risks of black box technology
Implementation of the EU General Data Protection Regulationhttp://www.nnit.com/OfferingsAndArticles/Pages/NNIT_EU_General_Data_Protection_Regulation_article.aspxImplementation of the EU General Data Protection Regulation