Industrial security — in several ways

For end users
factory_automation_industrial_networks

Industrial network security

HMS industrial network security products protect operational technology (OT) from cyber threats. By segmenting networks and "compartmentalizing" it is possible to improve security on the factory floor or in other critical applications.

For machine builders
shutterstock_540164185

Secure remote access

Secure remote access to machines protects equipment against unauthorized access and cyberthreats. HMS' Ewon remote solutions prioritize security, integrity, and reliability.

For device makers
AB6605_anybus_compactcom_security_platform_profinet

Integrated security

Anybus networking products allow industrial devices to connect to any network while providing protection from security threats. Available as embedded communication interfaces, stand-alone gateways, and wireless options with built-in security.


Ewon_Remote_Access_-_Cybersecurity_2_New
Known security issues

Cybersecurity advisories for HMS products

HMS puts lot of effort into developing secure and robust products. Nevertheless, we or others detect security issues in our products from time to time. When we are aware of a security issue we will publish information about the issue.

Our goal is to have updated firmware available before we publish the information officially, this to prevent security issues to be used in exploits.

Standards and regulations

Protecting uptime with trusted security

EU NIS2

Directive on the Security of Network and Information Systems that requires essential and important organizations to strengthen risk management, secure their networks and report incidents to improve Europe’s overall cyber resilience.

Valid from 18 Oct 2024

EU - RED DA

Radio Equipment Directive, requiring wireless and radio-enabled devices to meet essential safety, electromagnetic compatibility and cybersecurity requirements.

Required from 1 August 2025

EU - Machinery Regulation

Requires machine builders to address cybersecurity risks that could affect the safe functioning of machinery, ensuring that digital attacks cannot cause dangerous operation or loss of control.

Required from 20 January 2027

EU - Cyber Resilience Act

The Cyber Resilience Act is an EU regulation that requires connected devices and software products to include built-in baseline cybersecurity throughout their entire lifecycle.

Will apply in full from 11 December 2027, reporting requiremen form 11 September 2026

ISA/IEC 62443

International standard that provides a structured framework for securing industrial automation and control systems, with specific requirements for vendors to build secure products and for operators to manage risk, segment networks and maintain secure operations throughout the system lifecycle.

Validity: Generally voluntary, however embedded as the de-facto mandatory framework across multiple regulated sectors including energy, rail, chemicals, water, machinery and defence.

ISO 27001

The international standard for establishing, implementing and continuously improving an organisation’s information security management system.

Valid from: ISO 27001:2022 has been valid since October 2022

FAQ

Questions and answers

Industrial security, or industrial cybersecurity, is the protection of operational technology (OT) systems that run factories, utilities, and critical infrastructure. It focuses on preventing cyberattacks, disruptions, and unsafe conditions by securing controllers, networks, and industrial processes so operations stay safe, reliable, and continuously available.
OT security is important because industrial systems control real physical processes. A cyberattack can stop production, damage equipment, impact safety, or disrupt critical services like power or water. Protecting OT ensures reliability, uptime, and safety, and helps organizations meet regulatory requirements and avoid costly downtime.
IT security protects data, confidentiality, and business applications, while OT security protects physical processes, uptime, and safety. In IT, the priority is to keep information secure. In OT, the priority is to keep operations running safely and continuously, which often limits what security controls can be applied.
Embedded security means building protection directly into industrial devices at the hardware and firmware level. HMS supports this by enabling secure industrial communication within devices through the Anybus CompactCom IIoT Secure. It provides secure device identity, signed firmware, secure boot, and hardware‑based key protection. These features help manufacturers ensure that the communication interface of their device is secure by design and aligned with modern cybersecurity requirements.

Industrial systems are protected through layered network controls such as industrial firewalls, micro-segmentation, and protocol-based network separation. Firewalls enforce strict policies at the device or cell level, allowing only the specific traffic that PLCs, drives, and machines require while blocking everything else by default. Micro-segmentation limits communication to explicitly defined zones and conduits, reducing the attack surface and preventing lateral movement inside the OT network.

Protocol gateways further strengthen separation by allowing only approved commands or data to pass between zones, eliminating direct routable access to critical assets. Together, these controls provide visibility, deep protocol inspection, logging, and enforceable policy management so industrial systems remain isolated, monitored, and protected without disrupting operations.

HMS Networks ensures security through a certified Information Security Management System (ISMS). As part of this, HMS adheres to the following certifications:

- ISO 9001 (quality management)

- ISO/IEC 27001 (information security management)

- IEC 62443-4-1 (secure product development, ML3)

Together, these standards ensure secure development processes and strong protection of data and systems.

Secure remote access to OT environments should use encrypted VPN connections, outbound only communication, and strong role based authentication. A cloud hosted connection point with built in firewall capabilities can act as a secure conduit between IT and OT, enforcing traffic policies before access is granted. The same architecture can securely enable data collection from critical assets, such as diesel generators, without exposing the control network to the internet.

Additional resources

Do you want to find out more?

Featured
HMS classroom training

Classroom On-site Training

Join our IEC 62443: In-Depth Training with Dr Pierre Kobes - a leading contributor to the ISA/IEC 62443 series. Learn what the standard means in practice and what actually works in real operating environments.

Featured
IDS_Mockup_Whitepaper_How_to_secure_your_industrialremote_access_according_toNIS2_and_IEC_62443

How to secure industrial remote access according to NIS2 & IEC 62443

A guide to configuring Ewon Talk2m and devices for NIS2 compliance using the ISA/IEC 62443 framework.

Featured
Anybus-embedded-security-integration-guide

Anybus embedded security integration guide

A practical guide for designing secure devices with Anybus embedded interfaces. Covers design tips, regulations, and best practices.

What's happening

News and stories

    News
    Featured
    Stay_Ahead_With_Easy_OT_Network_Monitoring_HERO_Square

    HMS Networks launches new Atlas2 Plus for easy OT network monitoring & troubleshooting

    Discover the new Atlas2 Plus, a next-generation solution designed to make industrial network monitoring more predictive, accessible, and efficient.

    17 Sep 2025 at 00:00 GMT+2
    HMS Networks launches new Atlas2 Plus for easy OT network monitoring & troubleshooting
    Anybus
    |
    01 Aug 2025 at 08:00 GMT+2
    HMS Networks confirms RED compliance for Anybus wireless products
    Ewon
    |
    22 Jul 2025 at 01:00 GMT+2
    600,000+ Ewon gateways connected — Because reliability matters!
    HMS
    |
    28 May 2025 at 00:00 GMT+2
    Annual HMS Networks report confirms growing dominance of Industrial Ethernet
    Blog posts
    Featured
    NIS2_AdobeStock_115_6796637

    NIS2 requirements for Industrial Remote Access

    The industrial landscape is rapidly evolving as operational technology (OT) and information technology (IT) become more interconnected. While this connectivity facilitates efficiency, monitoring, and predictive maintenance, it also brings substantial cybersecurity challenges. Among these challenges, securing remote access to industrial systems is paramount, as vulnerabilities can compromise safety, productivity, and compliance with regulations. To address these growing risks, the NIS2 Directive (1) mandates security measures for industrial environments.

    Ewon
    |
    13 May 2025
    NIS2 requirements: How to achieve compliance for industrial remote access using IEC 62443 (Part 2)
    Anybus
    |
    12 Jun 2024
    Navigating cybersecurity regulations in industrial environments
    Anybus
    |
    03 Jun 2024
    Defending industrial automation against cyberattacks
    Anybus
    |
    03 Oct 2024
    Zones and Conduits: Essential Building Blocks of Industrial Network Security
    Events
    Featured
    IIoT_Security_Ewon

    Securing Your Operational Technology (OT) in a Digitalized World

    Protect your manufacturing operations in today's digital world by securing your OT systems. Ensure their security, availability, integrity, and confidentiality to maintain a seamless production cycle and prevent failures.

    Ewon
    |
    Ewon
    |
    03 Jun 2025
    Recommended controls in OT Remote Access for NIS2 compliance (based on ISA/IEC 62443)
    Anybus
    |
    14 Nov 2024
    Webinar: Practical Strategies to Defend Uptime in Operational Environments
    Anybus
    |
    16 Oct 2024
    Webinar: Securing Your Operational Technology (OT) in a Digitalized World
    Anybus
    |
    09 Sep 2024
    Anybus Defender Product Launch Webinar
    Product categories

    Products used for industrial security

    Talk to an expert on Industrial security

    Have a communication expert from HMS contact you to discuss your specific requirements.