Get to zero stealth natural gas_executive_overview_ch

168 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
168
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Get to zero stealth natural gas_executive_overview_ch

  1. 1. EXECUTIVE OVERVIEW Stop Cyber Threats to Natural Gas Supplies GO DARK WITH UNISYS STEALTH AND PROTECT YOUR SUPPLY
  2. 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. Gas utilities face increased risk of cyber threats to their networks, command and control applications, and their industrial automation components, such as Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. According to the U.S. Department of Homeland Security (DHS) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) report in January 2014, the agency cited ICS/SCADA and control system networks as one of the top two targets for hackers and viruses.1 Meanwhile, an industry research lab has seen approximately a 600% increase in ICS/SCADA vulnerabilities from 2010 through 2013.2 1 DHS. ICS-CERT Year in Review. http://ics-cert.us-cert.gov/sites/default/ files/documents/Year_In_Review_FY2013_Final.pdf 2 InfoSec Institute. SCADA & Security of Critical Infrastructures. http://resources.infosecinstitute.com/scada-security-of-critical- infrastructures/ How can gas utilities protect their facilities against a tidal wave of advanced persistent threats (APT) and other sophisticated threats while also reducing costs and improving agility? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  3. 3. Executive Overview3 Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security concerns. Stealth is designed to make SCADA endpoints connected to the network command and control centers at natural gas facilities invisible to unauthorized users and to secure data-in-motion across any network. This is how Stealth can help gas utilities Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized users at the control center to access devices, applications, and systems critical to the safe operation of natural gas utilities, from the supply chain to customer distribution. In addition to strengthening mission-critical protection, electric power organizations can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that natural gas utilities need to help secure their supply: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make network-operated ICS/SCADA devices at natural gas facilities and pipelines invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regu- latory requirements and recommendations. Reduces costs. Protect enterprise customer data, accounting, gas distribution, and ICS/SCADA with one cost-effective security solution—Stealth can cover both business and supply processes. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. You Can’t Hack What You Can’t See STEALTH COMMUNITIES OF INTEREST NETWORK COMMAND & CONTROL CENTER Go invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  4. 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Go Dark. Secure Your Supply. Contact us: Eastern Region: Paul Armstrong, 310-944-0833 paul.armstrong@unisys.com Central Region: Steve Walston, 972.629.4270 steve.walston@unisys.com Western Region: Loren Barnett, 303.518.5102 loren.barnett@unisys.com Federal: Sandy Holland, 703.447.4490 sandra.holland@unisys.com TOLA: Kim Henry, 469.939.0889 Kimberly.henry@unisys.com Business Development: Karen Walsh, 304.579.0391 karen.walsh@unisys.com Lari Young, 703.507.3401 lari.young@unisys.com Canada: Beverly Golchuk, 416.770.0662 beverly.golchuk@unisys.com UK: Simon Totterdell, +44 787.299.4090 simon.totterdell@unisys.com www.unisys.com/stealth

×