Cybersecurity for Modbus
Securing the Internet of Things™
Growing OT/ICS/SCADA Connectivity
Increases Cyber Exposure and Security Risks
• Operations
• Safety
• Ransomware
• Liability
Securing the Internet of Things™
Modbus Security Challenges
Modbus protocol was originally developed without security
(networks were air-gapped)
Device-to-device messages are inherently unsecure
Anyone that gets in or plugs into the network can:
• Discover network devices
• Watch and record all traffic
• See message types and details
• Inject commands
Securing the Internet of Things™
• Stops Cyber Attacks on OT Networks,
Buildings and Critical Infrastructure
• Cybersecurity “In a Box”
• Protects Devices at the Edge
• NIST Zero Trust Compliant
ISO 26262
ASIL D Certified
Developed in partnership with
Protects OT Devices
from Cyberattacks
Securing the Internet of Things™
DOME: Security Features
Authentication
Data Encryption
Secure Tunnels
Certificate Authority
Securing the Internet of Things™
DOME: Modbus Device Protection
Modbus TCP Modbus RTU
Protects devices on serial
trunks from attacks
originating on the IP
network
Protects IP network devices
from attacks originating on
a serial trunk
Protects individual devices
Protects devices behind
Modbus routers/gateways
Securing the Internet of Things™
DOME Dashboard DOME Interface
Appliance (DIA)
DOME Sentry
• Analytics
• Security Alerts
• Daily Status Email
• Manages Cloud Connection
• Device Management
• Credential Management
• Data Logging Capture
• STOPS Cyber Attacks
• Works with Installed Devices
• 100% NIST Zero Trust
• Zero Touch Onboarding
• Installs in <60 seconds
• No IT/Cyber Skills Needed
• Protects 1:1 and 1:Many
DOME supports “No Cloud Connectivity”
operation for secure Defense/Gov’t sites
DOME: “Cybersecurity in a Box”
Securing the Internet of Things™
DOME: Installation Benefits
System-driven approach improves speed
of implementation and eliminates errors
(e.g. automated certificates)
DOME Mobile App makes device
registration a simple “point-and-click”
process
Simplicity means no IT/Cyber expertise is
needed – installation by existing
technicians
Securing the Internet of Things™
DOME Mobile App™ Makes Installation Easy
No IT/Cyber Expertise Needed, No Manual Configuration
Select
Register Devices
Select Pre-Registered
Location
Scan QR Code Device Registered,
Security Credentials Auto-
Installed on Installation
Securing the Internet of Things™
Applying DOME in the Perdue Model
No IT/Cyber Expertise Needed, No Manual Configuration
Can be
implemented
from Levels 0-3
in the Purdue
Model
Securing the Internet of Things™
• Previous victim of a cyber attack
• IP-based riser trunks
• Serial-based floor trunks
• Entire OT network protected
with just 4 DOME Sentry devices
Example Deployment
32-Story Building in NYC
Securing the Internet of Things™
STOPS Cyber Attacks
• Real-time protection to the edge
• Only purpose-built solution for edge devices
Fully Packaged Cybersecurity Solution
• Eliminates need for IT / Cybersecurity resources
• Installs and protects in under 60 seconds
Works with New and Existing Devices
• Protection/Encryption between devices
• Supports commonly used IP network protocols
DOME: Cybersecurity Made Easy

Cybersecurity for Modbus Industrial Controls OT/ICS/SCADA

  • 1.
  • 2.
    Securing the Internetof Things™ Growing OT/ICS/SCADA Connectivity Increases Cyber Exposure and Security Risks • Operations • Safety • Ransomware • Liability
  • 3.
    Securing the Internetof Things™ Modbus Security Challenges Modbus protocol was originally developed without security (networks were air-gapped) Device-to-device messages are inherently unsecure Anyone that gets in or plugs into the network can: • Discover network devices • Watch and record all traffic • See message types and details • Inject commands
  • 4.
    Securing the Internetof Things™ • Stops Cyber Attacks on OT Networks, Buildings and Critical Infrastructure • Cybersecurity “In a Box” • Protects Devices at the Edge • NIST Zero Trust Compliant ISO 26262 ASIL D Certified Developed in partnership with Protects OT Devices from Cyberattacks
  • 5.
    Securing the Internetof Things™ DOME: Security Features Authentication Data Encryption Secure Tunnels Certificate Authority
  • 6.
    Securing the Internetof Things™ DOME: Modbus Device Protection Modbus TCP Modbus RTU Protects devices on serial trunks from attacks originating on the IP network Protects IP network devices from attacks originating on a serial trunk Protects individual devices Protects devices behind Modbus routers/gateways
  • 7.
    Securing the Internetof Things™ DOME Dashboard DOME Interface Appliance (DIA) DOME Sentry • Analytics • Security Alerts • Daily Status Email • Manages Cloud Connection • Device Management • Credential Management • Data Logging Capture • STOPS Cyber Attacks • Works with Installed Devices • 100% NIST Zero Trust • Zero Touch Onboarding • Installs in <60 seconds • No IT/Cyber Skills Needed • Protects 1:1 and 1:Many DOME supports “No Cloud Connectivity” operation for secure Defense/Gov’t sites DOME: “Cybersecurity in a Box”
  • 8.
    Securing the Internetof Things™ DOME: Installation Benefits System-driven approach improves speed of implementation and eliminates errors (e.g. automated certificates) DOME Mobile App makes device registration a simple “point-and-click” process Simplicity means no IT/Cyber expertise is needed – installation by existing technicians
  • 9.
    Securing the Internetof Things™ DOME Mobile App™ Makes Installation Easy No IT/Cyber Expertise Needed, No Manual Configuration Select Register Devices Select Pre-Registered Location Scan QR Code Device Registered, Security Credentials Auto- Installed on Installation
  • 10.
    Securing the Internetof Things™ Applying DOME in the Perdue Model No IT/Cyber Expertise Needed, No Manual Configuration Can be implemented from Levels 0-3 in the Purdue Model
  • 11.
    Securing the Internetof Things™ • Previous victim of a cyber attack • IP-based riser trunks • Serial-based floor trunks • Entire OT network protected with just 4 DOME Sentry devices Example Deployment 32-Story Building in NYC
  • 12.
    Securing the Internetof Things™ STOPS Cyber Attacks • Real-time protection to the edge • Only purpose-built solution for edge devices Fully Packaged Cybersecurity Solution • Eliminates need for IT / Cybersecurity resources • Installs and protects in under 60 seconds Works with New and Existing Devices • Protection/Encryption between devices • Supports commonly used IP network protocols DOME: Cybersecurity Made Easy