Cyber Security in Substations

Trust the experts


Substations must be comprehensively protected against cyber attacks. This requires a security strategy that takes hold on all levels. Such a security concept ranges from digital access monitoring and physical access control to monitoring and detection of suspicious or unauthorized activity in the network.

Our experts for protection technology and IEC 61850 have been dealing with the topic of cyber security in substations since 2011. The requirements here are different from those in the office IT environment. The focus is on monitoring the communication between the individual protection technology devices and the test and engineering PCs within the substation.

This is why special monitoring systems are required here that immediately alert in the event of non-compliant activity in the network.

Cyber Security
Cyber Security – Herausforderungen und Antworten
Video with Winnie

Cyber Security Task Force @ Omicron

The Cyber Dilemma
How to include security in networked protection engineering

Protection engineering and IT – do they really belong together at all? Although their inter actionis based on the same technology, there are vast differences between them when you actually look at the details. This poses great challenges to companies, especially when it comes to the topic of cyber security.

Download Paper

Hannover Messe 2019

Visit us in Hall 12, Booth B57 and find out more about the best ways to protect your substation and station automation system against cyber attacks.

StationScout, our system for efficient testing of your substation automation, integrates a firewall that guarantees secure connection between the test PC and the station network.

Testing of station automation systems

StationScout offers a clear overview of the entire system during commissioning and operation. Signals are tracked throughout the entire system, significantly reducing the time required to test the entire control system signalling with the powerful simulation functions. The integrated firewall establishes a secure connection between the test PC and the station network. Read more...1.15 MB

From protection testing to SCADA and communication test

IEC 61850 has meanwhile established itself worldwide as the standard for communication in substations. As a result, the necessity of testing control technology is increasingly becoming the focus of protection tests. With StationScout, OMICRON presents a product that enables a wide range of tests, visualising communication in a completely new way and giving high priority to cyber security at the same time. READ MORE...1.15 MB

Testing Automation and Control

StationScout is a new approach to be used in all phases of the lifecycle of SAS, utilizing the capabilities of the IEC 61850 engineering process and the data available in Substation Configuration Description (SCD) files. It introduces new and more efficient methods to identify potential signals, to recognize communication links and the used IEC 61850 services and to establish a cyber secure connection. Read More...1.15 MB

StationScout - Test Automation and Cyber Security

Testing automation, communication and SCADA takes as much time as testing protection - often more. StationScout simplifies all these tests, significantly reduces the effort required and separates the test PC from the station network with a cyber-secure firewall. Read More...1.15 MB

Ohne sichere Daten ist eine Strategie für die Weiterentwicklung des Schutzsystems kaum möglich. Spezielle Daten-Management-Systeme wie ADMO von OMICRON können diese Prozesse sinnvoll unterstützen.

No strategy without secure data

Protection systems are crucial assets of critical infrastructures. Therefore, regular inspections as well as systematic maintenance and documentation are urgently required. Special data management systems such as OMICRON’s ADMO can provide meaningful support for these processes. In this way, not only the requirements of the standards regarding cyber security are met. Energy suppliers thus create the basis for efficient and secure maintenance management.

The Challenge of Asset Management

The vulnerability of protection systems to cyber attacks is becoming a critical issue. On the one hand the implementation of adequate security systems is necessary and useful, on the other hand sometimes extremely cumbersome and develops restrictive bureaucratic traits that hinder daily processes. Here it is very helpful to use an easy-to-use tool that is tailored to the requirements of the protection auditors.

You are using an outdated browser version.
Please upgrade your browser or use another browser to view this page correctly.