Your SlideShare is downloading. ×
Get to zero stealth chemical processing_executive_overview_ch
Get to zero stealth chemical processing_executive_overview_ch
Get to zero stealth chemical processing_executive_overview_ch
Get to zero stealth chemical processing_executive_overview_ch
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Get to zero stealth chemical processing_executive_overview_ch

22

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
22
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. EXECUTIVE OVERVIEW Advance Safety and Cybersecurity DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
  • 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. To remain competitive, deliver the best products to the market securely, and meet increased regulatory requirements, the chemical processing industry must modernize. Unfortunately, these goals are often at odds with one another. Innovation and competitive- ness rely on new technology that integrates business processes (real-time analytics, enterprise resource planning, supply chain automation) with production. But the introduction of the latest supervisory control and data acquisition (SCADA) systems, industrial control systems (ICS), and programmable logic controllers (PLCs) and their related human-machine interface (HMI) and machine-to-machine (M2M) software puts chemical companies at significant risk for cyber-attacks. According to a recent report in Reuters (March 2014), at least 48 chemical and defense plants were attacked with a virus called ‘Nitro.’ Sources report the virus originated in China, and the targets were vulnerable to data theft, such as formulas and pro- cessing techniques. Such viruses can also disrupt operations and bring down entire network systems.1 1 Finkle, Jim. ‘Nitro’ Attacks: China-Based Hacker Targeted Chemical Firms. Reuters, March 26, 2014. http://www.huffingtonpost.com/2011/10/31/ nitro-attacks-china-hacker-chemical-firms-symantec_n_1067978.html How can chemical companies protect their facilities against advanced persistent threats (APT) and other sophisticated cyber-attacks while also reducing costs and improving agility? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  • 3. Executive Overview3 Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing the most critical security concerns. Stealth is designed to make SCADA/ICS and PLC endpoints at chemical processing plants on the command and control network invisible to unauthor- ized users and to secure data-in-motion across any network. This is how Stealth can help chemical companies Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized users to access automated devices, applications, and systems critical to the chemical processing facility. In addition to strengthening mission-critical protection, chemical companies can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as business requirements or regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that chemical companies need to help secure their operations: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make automated chemical processing controls such as ICS/SCADA endpoints and HMI systems invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Make mobile and wireless applications more secure. Protect data-in-motion over the industrial control network. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect the chemical processing enterprise system, including sensitive financial, production processes, formulas, and network data with one cost-effective solution. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving business needs. You Can’t Hack What You Can’t See STEALTH COMMUNITIES OF INTEREST NETWORK COMMAND & CONTROL CENTER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  • 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Contact us: Eastern Region: Paul Armstrong, 310-944-0833 paul.armstrong@unisys.com Central Region: Steve Walston, 972.629.4270 steve.walston@unisys.com Western Region: Loren Barnett, 303.518.5102 loren.barnett@unisys.com Federal: Sandy Holland, 703.447.4490 sandra.holland@unisys.com TOLA: Kim Henry, 469.939.0889 Kimberly.henry@unisys.com Business Development: Karen Walsh, 304.579.0391 karen.walsh@unisys.com Lari Young, 703.507.3401 lari.young@unisys.com Canada: Beverly Golchuk, 416.770.0662 beverly.golchuk@unisys.com UK: Simon Totterdell, +44 787.299.4090 simon.totterdell@unisys.com www.unisys.com/stealth Don’t Be a Target. Go Invisible.

×