A GLOBAL SOLUTION ADAPTED TO THE CONSTRAINTS OF OPERATIONAL TECHNOLOGY INDUSTRIAL SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Similar documents
MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions

COLLABORATIVE SECURITY. Network Security Endpoint Security Data Security

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

NETWORK SECURITY STORMSHIELD. Unified Threat Management Solutions and Next- Generation Firewalls

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

Cyber Resilience Solution for Smart Buildings

Introduction to ICS Security

Cyber Security. CyberSecurity. For more information: Airbus CyberSecurity

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

External Supplier Control Obligations. Cyber Security

SCADA Security: How Do I Know If I ve Already Been Owned?

Security

Comprehensive Database Security

Detection and Analysis of Threats to the Energy Sector (DATES)

Protect Your End-of-Life Windows Server 2003 Operating System

T22 - Industrial Control System Security

Protecting Smart Buildings

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Industrial Control Systems Providing Advanced Threat Detection

Industrial Defender ASM. for Automation Systems Management

Introduction, Overview and Capabilities. Revision Date: 01/11/13 Copyright MicroSolved, Inc., 2013 All Rights Reserved.

McAfee MVISION Mobile epo Extension Product Guide

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

THE CYBERX PLATFORM: PROTECT YOUR PEOPLE, PRODUCTION, AND PROFITS HIGHLIGHTS SOLUTION BRIEF

Symantec Network Access Control Starter Edition

Symantec Advanced Threat Protection: Endpoint

Data Sheet. Claroty Platform: Continuous Threat Detection

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Automation Services and Solutions

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Symantec Endpoint Protection

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Protect Your End-of-Life Windows Server 2003 Operating System

Symantec Network Access Control Starter Edition

Security in a Converging IT/OT World

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Resolving Security s Biggest Productivity Killer

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

INTRODUCING SOPHOS INTERCEPT X

Instantaneous protection and fast scans without the hassle of time-consuming patches and signature updates.

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

Information Security Controls Policy

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

ICS Security Monitoring

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Protecting productivity with Industrial Security Services

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Administering System Center 2012 Configuration Manager

Evolutia pietei de IT

Threat Centric Vulnerability Management

Services solutions for Managed Service Providers (MSPs)

Continuous protection to reduce risk and maintain production availability

Symantec Network Access Control Starter Edition

Digital Workspace SHOWDOWN

Toward Open Source Intrusion Tolerant SCADA. Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania

CISCO EXAM QUESTIONS & ANSWERS

SECURING DEVICES IN THE INTERNET OF THINGS

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

Symantec Industrial Control System Protection (ICSP) Support for DeltaV Systems

Securing Industrial Control Systems

Endpoint Security and Virtualization. Darren Niller Product Management Director May 2012

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

WHITE PAPER. Vericlave The Kemuri Water Company Hack

Cisco Incident Control System

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

N-Dimension n-platform 340S Unified Threat Management System

Are we breached? Deloitte's Cyber Threat Hunting

Cyber Security. Our part of the journey

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

Back to the Future Cyber Security

Authenticate and encrypt all serial data communications to protect critical assets

Communication Pattern Anomaly Detection in Process Control Systems

Virtual Patching Solution: Increased Protection and Reduced Maintenance for Process Control Systems

RUAG Cyber Security Understand Cyber. Protect Values.

BUFFERZONE Advanced Endpoint Security

McAfee Embedded Control

McAfee Embedded Control

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

Symantec Business Continuity Solutions for Operational Risk Management

Predictive malware response testing methodology. Contents. 1.0 Introduction. Methodology version 1.0; Created 17/01/2018

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

Cyber security - why and how

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

THE RISE OF GLOBAL THREAT INTELLIGENCE

Digital Wind Cyber Security from GE Renewable Energy

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

DOCUMENT* PRESENTED BY

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Transforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world

Transcription:

A GLOBAL SOLUTION ADAPTED TO THE CONSTRAINTS OF OPERATIONAL TECHNOLOGY INDUSTRIAL SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

OT - A DIFFERENT SET OF CONSTRAINTS MAJOR SECURITY CHALLENGES Industrial systems (OT), like information infrastructures (IT), are permanently exposed to the threat of external attacks or internal malicious acts. In an industrial setting, the human and environmental risks incurred may be particularly critical - equipment must be available at all times to prevent the potentially significant consequences of production coming to a standstill. PROFUSION OF SYSTEMS AND CONTRIBUTORS The management of networks and IT operating systems involves clearly identified responsibilities in the corporation with each business unit managing its own applications. In the industrial world, installations may depend on processes devised and maintained by external service providers. As a matter of fact, such internal and external interactions require iterative inventories and management of regulated access by external service providers. IT/OT: SYSTEMS WITH MUCH IN COMMON BUT UNDER DIFFERENT OPERATIONAL CONSTRAINTS If budgets for security systems tend to be similar, the principles of continuous improvement and the pace of deployment are peculiar to individual operational constraints. During production phases, industrial systems have to remain stable and act as airtight perimeters. In IT, collaboration between individual users prevails while perimeters, however, remain open.

Stormshield Solutions for Industrial Systems GLOBAL PROTECTION FOR NETWORK INFRASTRUCTURES AND OPERATIONAL INDUSTRIAL SYSTEMS KEY POINTS OF SECURITY SOLUTIONS DETECT AND PROTECT WITHOUT LEAVING ANY IMPACT ON YOUR INDUSTRIAL ACTIVITY By incorporating Stormshield security solutions into both OT (Operational Technology) as well as IT (Information Technology), your production systems will be protected by a combination of technologies that leave no undesirable impact on your business activity. All your systems will therefore be equipped with a unique technical solution adapted to both worlds. MAP YOUR ACTIVE APPLIANCES Thanks to our visual monitoring tool, view the list of active appliances on your network in real time. This global view of your network provides welcome assistance in the regular management of your system's inventory. INTEGRATE A PRODUCT ADAPTED TO YOUR ENVIRONMENTS With Stormshield Network 's global solution, integrate a single software product for a one-stop administration process regardless of the area of activity (OT or IT). This software is available according to your requirements in strengthened Hardware IT or OT formats for the protection of PLCs (Programmable Logic Controllers). STAY IN CONTROL OF YOUR OPERATIONAL WORKSTATIONS In a Microsoft Windows environment, workstations represent sensitive points in your operational system. To secure them, the solution allows you to block USB keys and other removable devices. This proactive solution is ideal in offline environments as it does not use any signature base and therefore does not require any updates. Stormshield Network Unique solution for industries and IT 15 years of experience in IT security A single program for all appliances Standard 1U/2U and ruggedized DIN hardware IP-based protocols Industrial protocols: DNP3/S7/ Modbus Innovative vulnerability detection tool for Microsoft Windows workstations 13 years of experience in Endpoint security Unique signatureless behavioral technology that relies on proactive protection from known and unknown attacks. Context-based policy that allows validating external service providers' access to the OT network Control of removable devices (USB keys, external hard disks)

A global techn for the indu INTERNET IT Stormshield Network MAIL SERVER ERP

ical solution strial world EXTERNAL SERVICE PROVIDER Event Aggregation HISTORIAN SERVER OT Stormshield Network PLC ENGINEERING CONSOLE SCADA

Stormshield, a fully-owned subsidiary of Airbus Defence and Space, offers innovative end-to-end security solutions to protect networks (Stormshield Network ), computers ( ) and data (Stormshield Data ). WWW.STORMSHIELD.EU Version 1.1 - Copyright Stormshield 2016