1 / 3

A complete guide to cyber security norms followed by Xenius

Xenius has endured adequate care to assure that its systems are compliant with all Ministry of Power guidelines. Check Xenius' IoT solutions for your business: www.xenius.in

xeniusm2m
Download Presentation

A complete guide to cyber security norms followed by Xenius

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A complete guide to cyber security norms followed by Xenius In today’s digitally-run power sector, data storage is of crucial importance. Any compromise with the data, through hacking or whatever, can result in huge losses to power utilities. To guard against it, the Government has formulated a detailed set of guidelines. Xenius systems comply fully to all these guidelines, thereby, ensuring foolproof security of data. Power sector has undergone a great transformation during the last decade. With advancement in technology and Internet of Things (IoT), it has moved away from analogue to digital systems, which are connected via the Internet. These systems are not only smarter, but more accurate as well. The data stored on the servers is confidential and any leakage can prove catastrophic. Though the new smart systems are highly advanced and help the electricity departments a great deal in generating revenue, they are also prone to hacking. Once that happens, it can cause huge revenue loss to power departments, as also the Government. Though the new smart systems are highly advanced and help the electricity departments a great deal, they are also prone to hacking. Xenius has taken sufficient care to ensure that its systems are compliant to all the guidelines issued by the Ministry of Power. The Cloud services used by Radius are MEITY-approved and the metering and consumer data is stored in India. The back-end architecture is protected by Firewall and network security with proper authentication process.     To protect the systems from getting hacked, the Ministry of Power has set in place detailed guidelines to safeguard the server. In this regard, Xenius has taken sufficient care to ensure that its systems are compliant to all these guidelines. Some of these are:

  2. 1. VAPT (Vulnerability Assessment and Penetration Testing): It is a systematic process of determining the vulnerability of an application. 2. CERT-In (Indian Computer Emergency Response Team): A national nodal agency under the Ministry of Electronics & Information Technology (MEITY), its purpose is to respond to computer security incidents, report on vulnerabilities and promote effective IT security practices. 3. CMMI (Capability Maturity Model Integration): A process and behavioural model that helps organisations streamline process improvement and encourage productive and efficient behaviours that decrease risks in software, product, and service development.) 4. Private APN & MPLS (Access Point Name and Multiprotocol Label Switching): The devices in network communicate to the Cloud using private IPs that are not accessible through the public Internet. The traffic of these devices terminates at the Cloud through MPLS on a private IP, which is also not accessible from the public internet. This private APN and MPLS link is created by a licenced national long distance (NLD) carrier. This licenced carrier secures the communication between devices and meters etc. as per APN guidelines issued by the Ministry of Telecom. 5. MEITY-approved Cloud - The Cloud services used by Radius are MEITY-approved and the metering and consumer data is stored in India. 6. Isolated network layer -The back-end architecture comprising HES (Head End System), MDMS (Metering Data Management System), VEE (Validation, Editing and Estimation) and Web Access Layer are protected by Firewall and network security with proper authentication process. 7. Local IP - The configuration of all on-field devices and back-end servers are configured on Local IP (Private IP) to nullify any sort of penetration in the network through the Internet. Being certified of all the above-listed guidelines, the Xenius system makes the data 100-pc secure for companies and power utilities. Source: https://www.xenius.in/a-complete-guide-to-cyber-security-norms-followed-by- xenius/ Xenius Offers IoT/M2M solution to Real estate, Discoms and Manufacturing Industry Prepaid meter, Smart city, Smart grid, smart building, Diesel generator, water, and solar energy management are our solutions. Interested in our solution

  3. Call us: +91-120-4201765, 7303093408 Email: info@xenius.in Address: H-98, H Block, Sector 63, Noida, Uttar Pradesh 201301

More Related