Get to zero stealth industrial manufacturing_executive_overview_ch


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Get to zero stealth industrial manufacturing_executive_overview_ch

  2. 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. Today, most automated manufacturing process systems are connected to business networks. As a result, modern industrial automation controls and human-machine interfaces (HMIs) run on the same hardware and software as their business networks, such as Intel processors and Microsoft Windows or Linux operating systems. Because of the interconnected world of modern manufacturing, industrial controls are subject to malicious code that can propagate throughout the entire manufacturing execution system (MES) and machine to machine (M2M) environment. According to a report in Engineering and Technology, “Key information regarding vulnerabilities in Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems is now openly available from a range of sources on the public Internet.”1 In addition, legacy control systems, never meant to interface or be exposed to common IP-based networks, may be especially vulnerable as they were not designed to operate in such a highly 1 Hayes, Jim. Critical infrastructure hack data found in public domain. Engineering and Technology Magazine, January 28, 2014. interconnected environment. Manufacturers must pro- tect both types of controls: “black box” legacy controls and more modern, microprocessor-based systems.2 How can manufacturers protect their critical process controls and enterprise assets from advanced persistent threats (APT) and other sophisticated cyber threats while also accelerating time-to-market and reducing costs? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. 2 Pinto, Jim. Automation & IT systems are different. pinto/automation-systems-cyber-security Keep Critical Infrastructure Secure
  3. 3. Executive Overview3 STEALTH COMMUNITIES OF INTEREST Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security threats by making endpoints such as SCADA/ICS and PLCs on HMI and M2M networks invisible to unauthorized users and by securing data-in-motion across any network. This is how Stealth can help industrial organizations Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized users to access devices, applications, and systems critical to manufacturing system infrastructure. Intellectual property can be protected from theft, and production lines and systems can be secure. In addition to strengthening mission-critical protection, manufacturing organizations can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that industrial manufacturing organizations need to help improve safety and secure their supply: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make network-operated ICS/SCADA devices invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect enterprise customer data, accounting, production, and ICS/SCADA with one cost-effective security solution—Stealth can cover both business and supply processes. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. You Can’t Hack What You Can’t See STEALTH COMMUNITIES OF INTEREST NETWORK COMMAND & CONTROL CENTER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  4. 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” Protect What Matters Most Contact us: Eastern Region: Paul Armstrong, 310-944-0833 Central Region: Steve Walston, 972.629.4270 Western Region: Loren Barnett, 303.518.5102 Federal: Sandy Holland, 703.447.4490 TOLA: Kim Henry, 469.939.0889 Business Development: Karen Walsh, 304.579.0391 Lari Young, 703.507.3401 Canada: Beverly Golchuk, 416.770.0662 UK: Simon Totterdell, +44 787.299.4090