Your SlideShare is downloading. ×
  • Like
Get to zero stealth water supply treatment_executive_overview_ch
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Get to zero stealth water supply treatment_executive_overview_ch

  • 15 views
Published

Unisys Stealth Get to Zero Water Supply Treatment Executive Overview

Unisys Stealth Get to Zero Water Supply Treatment Executive Overview

Published in Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
15
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. EXECUTIVE OVERVIEW Keep Water Supplies Safe from Cyber Threats DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
  • 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. To provide safe water for public use, water distribution and treatment utilities have heavily invested in automated systems to improve reliability, safety, and to meet ever-stricter regulatory demands. These modernized systems are increasingly dependent on Remote Telemetry Units (RTUs), Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition systems (SCADA). These systems are critical to not just the monitoring and efficient distribution of our water supply, but also are critical in areas such as water filtration and chlorine, ammonia, and fluoride dosing. But these components are in the cross-hairs of Advanced Persistent Threats (APT) and many other cyber-threats. Primary targets include: 1) ICS/SCADA and related RTUs. These systems make up nearly seven percent of the entire SCADA installed base.1 This amounts to hundreds of thousands of targeted water control units. As demand and greater water conservation and treatment technologies improve, water utilities will deploy even more ICS/SCADA/RTUs. 1 Frost & Sullivan, Strategic Analysis of the Global SCADA Market, March 2013 2) Command and control centers. These remote units and controls are routed through central command centers at most utilities. However, the communication to and from these field units is over a variety of mediums: radio, wireless, and Ethernet connections to the centers’ Human- Machine Interfaces (HMIs). How can water treatment facilities strengthen mission- critical security, reduce costs, and increase agility— all at the same time? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  • 3. Executive Overview3 STEALTH COMMUNITIES OF INTEREST Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security concerns by making ICS/ SCADA/RTU endpoints and the command and control center network invisible to unauthorized users and by securing data-in-motion across any network. This is how Stealth can help water utilities Get to Zero Incidents. By creating highly-trusted Communities of Interest (COI), Stealth is designed to allow only authorized users to access devices, applications, or systems critical to water supplies and water treatment facilities. In addition to strengthening mission- critical protection, water treatment utilities can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility utilities need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that water utilities need to help maintain reliability, safety, and security: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make RTU and ICS/SCADA endpoints invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Protect data-in-motion with high-level encryption. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect the water utility enterprise, including customer data, accounting, and distribution and treatment with one cost-effective security solution. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. You Can’t Hack What You Can’t See NETWORK COMMAND & CONTROL CENTER TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. x
  • 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Don’t Be a Target. Go Invisible. Contact us: Eastern Region: Paul Armstrong, 310-944-0833 paul.armstrong@unisys.com Central Region: Steve Walston, 972.629.4270 steve.walston@unisys.com Western Region: Loren Barnett, 303.518.5102 loren.barnett@unisys.com Federal: Sandy Holland, 703.447.4490 sandra.holland@unisys.com TOLA: Kim Henry, 469.939.0889 Kimberly.henry@unisys.com Business Development: Karen Walsh, 304.579.0391 karen.walsh@unisys.com Lari Young, 703.507.3401 lari.young@unisys.com Canada: Beverly Golchuk, 416.770.0662 beverly.golchuk@unisys.com UK: Simon Totterdell, +44 787.299.4090 simon.totterdell@unisys.com www.unisys.com/stealth