Yokogawa Electric Corporation

Founded - 1915; HQ - Musashino, Tokyo, Japan
Company
Products
Services
We are in a new age of controlling operational risks. Achieving operational excellence in the Industrial plant needs effective risk control and management for both safety and security. To help our customers continue their industrial operations safely and securely, Yokogawa provides comprehensive solutions and services based on defense in depth strategy. We focus on delivering long-term lifecycle services while understanding customers' challenges and working continuously for improvements in a close partnership. Yokogawa follows one overall objective: to minimize risk and maximize corporate values according to our self-commitment as a lifecycle value partner. Yokogawa aims to become your #1 trusted partner and achieve long-term, stable, and secure operations. Yokogawa Blog  
OpreXᵀᴹ Safety and Security 

OpreXᵀᴹ is the all-new comprehensive brand for Yokogawa’s industrial automation and control business. The OpreXᵀᴹ brand stands for excellence in the technology and solutions that Yokogawa cultivates through the co-creation of value with its customers.  

Under this new brand may be found all the Yokogawa control products, services, and other solutions that customers are using to digitalize and transform their businesses and drive growth in this time of unprecedented change. This comprehensive brand comprises the five categories of Transformation, Control, Measurement, Execution, and Lifecycle. The activities covered under OpreXᵀᴹ Lifecycle contribute substantially to attain high levels of maintenance efficiency required for stable and efficient operation over the entire length of the plant lifecycle. OpreXᵀᴹ Safety and Security is placed under Lifecycle category to deliver a full range of solutions and services to effectively minimize both safety and security risks for customers’ systems. 

Cybersecurity Consulting Services 

In this rapidly changing world, one place where momentous change is being felt is the industrial automation field. Thanks to the advent of big data, cloud computing, the Industrial Internet of Things (IIoT), Industry 4.0, and artificial intelligence, a digital transformation is underway that is changing every facet of how businesses operate. At the same time, increasing cyber threat landscape and vulnerabilities pose higher risks for safety and business continuity. In fact, OT cybersecurity is roughly a decade behind the maturity of IT security in developing security organizations, skilled resources planning, and so on. 

Yokogawa Cybersecurity Consulting Services help customers deploy proper security solutions for their plants to ensure safe operation while adapting to new technology for achieving higher efficiency and productivity. With wide experiences in providing industrial automation and services in greenfield and brownfield, Yokogawa security consultants and engineers have in depth knowledge with various security standards, frameworks, regulations and guidance: such as ISA/IEC 62443 series, ISO/IEC 27000 series, NIST CSF, NERC-CIP, GICSP, etc. 

Implementing and Maintaining Security Program 

Taking a lifecycle perspective, Yokogawa Security Program has developed the security program. The program combines over 100 years of expertise in industrial automation, best practices in cybersecurity architecture design, and plant operations knowledge to ensure safe and secure operation, which is the paramount priority for our customers and Yokogawa. This security program addresses cybersecurity risks for any industrial environment (incl. non-Yokogawa). By working together with customers Yokogawa identifies the required level of security, assess the risks they face, and tailor the security program to address the gap while following Industrial Standards and Guidelines. This results in a roadmap that enables the customer to implement cybersecurity measures where they need it most. 

  1. Awareness & Training
    To keep educating and uphold awareness among employees about cybersecurity knowledge for correct decision making. 
  2. Risk Assessment
    To identify the existing security risks in a prioritized order based on system vulnerabilities and incident impact levels.
  3. Policies & Procedures
    To define the most practical policies and procedures for avoiding any gap between three main pillars-people, processes, and applied technology at the site.
  4. Business Cases Development
    To create the investment business case and build a security roadmap plan for the mid to long term considering the budget and achievable goals. 
  5. Design & Implementation phase
    To implement defense-in-depth security countermeasures for keeping the operation availability at the highest level.
  6. Managed Service phase
    To implement enterprise-wide security managed services for timely monitoring, protection, and response at the first view.