Stealth for Nuclear Power
 

Stealth for Nuclear Power

on

  • 65 views

To learn more visit: http://www.unisys.com/gettozero ...

To learn more visit: http://www.unisys.com/gettozero

Cyber-attacks are on the rise, and the nuclear sector is a prime target. Unisys StealthTM is designed to protect critical infrastructure in a flexible, non-disruptive manner.

Help prevent cyber-attack by making automated control endpoints invisible. With Stealth, only users authorized into a secure Community of Interest (COI) have access to controls attached to command and control networks.

Statistics

Views

Total Views
65
Views on SlideShare
65
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

 Stealth for Nuclear Power Stealth for Nuclear Power Document Transcript

  • EXECUTIVE OVERVIEW Cyber Threats Challenging Nuclear Safety and Security? DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
  • Executive Overview2 Zero Incidents: Your Goal. Our Mission. The nuclear energy industry, especially in the U.S. and Europe, has one of the best track records in the power industry for safety, reliability, and security. Current nuclear facilities use both digital and hard-wired analog systems to monitor plant processes, operate equipment, and store and retrieve information. It is the digital components, including individual computers and networks, which are vulnerable to cyber-attacks. These cyber threats may include the infection of digital systems with malware such as viruses, worms and other types of programming code.1 1 Nuclear Energy Institute. No Additional Regulation is Needed. http://www.nei.org/Master-Document-Folder/Backgrounders/Policy- Briefs/Cyber-Security-Strictly-Regulated-by-NRC;-No-Addit How can nuclear facilities fend off the mounting dangers posed by digital controls, advanced persistent threats (APT), supply chain weaknesses, and other risks while reducing costs and improving agility? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  • Executive Overview3 STEALTH COMMUNITIES OF INTEREST Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security concerns by making control devices and other endpoints on the command and control network invisible to unauthorized users and by securing data-in-motion across any network. This is how Stealth can help nuclear power facilities Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized COI users to access devices, applications, and systems critical to nuclear power plant operations. In addition to strengthening mission-critical protection, electric power organizations can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that nuclear utilities need to help maintain reliability, safety, and security: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation. Reduces risk. Make nuclear facility networks, including HMIs and their connected analog and digital controllers from hackers and malicious code invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect systems with one cost- effective security solution—Stealth can cover both business and power and distribution processes. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. You Can’t Hack What You Can’t See STEALTH COMMUNITIES OF INTEREST NETWORK COMMAND & CONTROL CENTER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  • © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Contact us: stealth@unisys.com Don’t Be a Target. Go Invisible. Incidents YOUR GOAL. OUR MISSION.