
Your Network's Edge®
Cyber Security
You are here
Cyber Security for Critical Infrastructure
RAD's Service Assured Networking solutions with built-in security ensure that your operational network remains reliable and protected at all times.
RAD’s Industrial IoT Backhaul Demo
Enable fast, secure and economical deployment of new IIoT sites
Cyber Shield for Critical Infrastructure
Protects from Attacks on SCADA and Management Traffic
Substation security gateway isolates industrial control systems (ICS)/automation devices from attack vectors on management and SCADA planes
Boost NERC-CIP Compliance
RAD's SAN solutions are in line with the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC-CIP) directives to boost your cyber security and compliance levels:
- Encryption and integrity for all communications outside ESP
- Application-aware (SCADA-aware) firewall
- Record/monitor all device connections in substations
Strategically located to securely manage all electronic access to the substation’s ESP
Megaplex-4
The Megaplex-4’s ability to handle a broad range of Ethernet, data and voice services, as well as a large variety of network technologies, in a single compact managed node, makes it an ideal solution for carriers and service providers. The device also provides a perfect fit for large enterprises, utilities and transportation companies who require an efficient way to transport and provision multiple legacy and next-generation services over their high capacity pipes. Megaplex-4 can be used as a central aggregation unit for TDM and Ethernet CPEs that are connected over various access link technologies, e.g., HSDSL and SDH/SONET.
The Megaplex-4 is available with a cable management solution to reduce storage space and handling, and eliminate cable waste.
SecFlow-2
The SecFlow-2 is ideal for industrial IoT backhaul, enabling fast, secure and economical deployment of new IoT sites. Allowing secure connectivity over wireless or fiber networks – either public (e.g., cellular) or private, it connects all types of industrial devices, including RTUs, smart meter aggregation devices, IoT base stations or concentrators, CCTV cameras, point of sale devices, Wi-Fi base stations, and more. SecFlow-2 is also used for operational WANs, providing reliable secure Layer 2 and Layer 3 communications for power utilities, water and gas utilities, public safety and homeland security agencies, as well as intelligent transportation operators.
SecFlow-1
SecFlow-1 is ideal for industrial IoT backhaul, enabling fast, secure and economical deployment of new IoT sites. Allowing secure connectivity over wireless or fiber networks – either public (e.g., cellular) or private, it connects all types of industrial devices, including RTUs, smart meter aggregation devices, IoT base stations or concentrators, CCTV cameras, point of sale devices, Wi-Fi base stations, and more. SecFlow-1 is also used for operational WANs, providing reliable and secure Layer 2 and Layer 3 communications for power utilities, water and gas utilities, public safety and homeland security agencies, as well as intelligent transportation operators.
Resources
Brochures
- Megaplex-1
- Megaplex-4
- SecFlow
- RADview
- Cyber Shield for Critical Infrastructure
- Smart city communications
- Highway Communications
- Train and Metro Communications
- Air-traffic control communications
- Water utility communications
- Oil & Gas Utility Communications
- Power Utility Communications
- Cyber Security for Critical Infrastructure
White Papers
- The Future of Power Grids
The Future of Power Grids – White Paper
The Future of Power Grids
5 Trends and Their Effect on Utility CommunicationsPower utility networks are becoming smarter, automated and more connected, as they gradually transform into Smart Grids. Looking forward, there are several key trends that drive the design of tomorrow’s utility networks – most of which are closely connected with the rise of IoT (Internet of Things) – and which need to be accommodated by adequate communication solutions:
Download the file
To download this file, please fill in the details below. Already registered? Sign in.
The Future of Power GridsSuccess!
Recommended
Get important update regarding resource file and it's Solution each-system. Add to briefcaseOur representatives contact you better understand your needs. GET A QUOTE - RAD Check Point Robust Cyber Security for Power Utilities
RAD Check Point Robust Cyber Security for Power Utilities – White Paper
RAD Check Point Robust Cyber Security for Power Utilities
The security of critical networks is at the center of attention of industry and government regulators alike. Check Point and RAD offer a joint end-to-end cyber security solution that protects any utility operational technology (OT) network by eliminating RTU and SCADA equipment vulnerabilities, as well as defends against cyber-attacks on the network’s control and data planes.
Download the file
To download this file, please fill in the details below. Already registered? Sign in.
RAD Check Point Robust Cyber Security for Power UtilitiesSuccess!
Recommended
Get important update regarding resource file and it's Solution each-system. Add to briefcaseOur representatives contact you better understand your needs. GET A QUOTE - Cyber Security Critical Infrastructure Protection
Cyber Security Critical Infrastructure Protection – White Paper
Cyber Security Critical Infrastructure Protection
How Power Utilities Can Protect Their Networks in a Hyper-Connected EnvironmentSecuring Industrial Control Protocol (ICP) networks in a power utility environment is challenging. Current security solutions have limitations due to numerous vulnerabilities inherent in the communications network. This white paper explores the various security approaches, discussing the benefits and limitations of each.
What you will learn:
Download the file
To download this file, please fill in the details below. Already registered? Sign in.
Cyber Security Critical Infrastructure ProtectionSuccess!
Recommended
Get important update regarding resource file and it's Solution each-system. Add to briefcaseOur representatives contact you better understand your needs. GET A QUOTE
Webinars
- Applying NERC CIP v5 to Your Cybersecurity Strategy – A Light Reading Webinar
Applying NERC CIP v5 to Your Cybersecurity Strategy – A Light Reading Webinar
Applying NERC CIP v5 to Your Cybersecurity Strategy – A Light Reading Webinar
Given the global nature of cyber security threats, regulators around the world are closely following the recently released NERC CIP v5 – the first set of critical infrastructure protection cyber security standards that attaches enforceable penalties to non-compliant power utilities.
Download the file
To download this file, please fill in the details below. Already registered? Sign in.
Applying NERC CIP v5 to Your Cybersecurity Strategy – A Light Reading WebinarSuccess!
Recommended
Get important update regarding resource file and it's Solution each-system. Add to briefcaseOur representatives contact you better understand your needs. GET A QUOTE
LinkedIn Discussions
Application Briefs
Brochures
White Papers
Webinars
LinkedIn Discussions
Videos
Application Briefs