Get to zero stealth nuclear power_executive_overview_ch
Cyber Threats Challenging
Nuclear Safety and Security?
DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
Your Goal. Our Mission.
The nuclear energy industry, especially in the U.S.
and Europe, has one of the best track records in
the power industry for safety, reliability, and security.
Current nuclear facilities use both digital and
hard-wired analog systems to monitor plant
processes, operate equipment, and store and
retrieve information. It is the digital components,
including individual computers and networks, which
are vulnerable to cyber-attacks. These cyber threats
may include the infection of digital systems with
malware such as viruses, worms and other types
of programming code.1
Nuclear Energy Institute. No Additional Regulation is Needed.
How can nuclear facilities fend off the mounting
dangers posed by digital controls, advanced
persistent threats (APT), supply chain weaknesses,
and other risks while reducing costs and improving
agility? With Unisys Stealth™, you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
Consolidate. Reduce reliance on physical
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
Keep Critical Infrastructure Secure
STEALTH COMMUNITIES OF INTEREST
Stop Cyber Assaults
Before They Happen
Unisys Stealth takes a radically different approach
to addressing security concerns by making control
devices and other endpoints on the command and
control network invisible to unauthorized users and
by securing data-in-motion across any network.
This is how Stealth can help nuclear power facilities
Get to Zero Incidents.
By creating highly-trusted communities of interest
(COI), Stealth is designed to allow only authorized
COI users to access devices, applications, and
systems critical to nuclear power plant operations.
In addition to strengthening mission-critical protection,
electric power organizations can reduce infrastructure
costs by safely modernizing their industrial controls
and software with one unified security solution. And
as regulatory mandates change, Stealth can deliver
the agility enterprises need without requiring costly
upgrades or extensive reconfiguration.
Why Stealth Now?
Unisys Stealth is the innovative, mission-critical
security that nuclear utilities need to help maintain
reliability, safety, and security:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation.
Reduces risk. Make nuclear facility networks,
including HMIs and their connected analog and
digital controllers from hackers and malicious code
invisible. Isolate critical systems from the rest of
the enterprise. Tighten access control based on
Facilitates compliance. Stealth can help achieve
compliance with the Executive Order on Improving
Critical Infrastructure Cybersecurity, and other
regulatory requirements and recommendations.
Reduces costs. Protect systems with one cost-
effective security solution—Stealth can cover both
business and power and distribution processes.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving regulatory
requirements or mission/business needs.
You Can’t Hack What You Can’t See
STEALTH COMMUNITIES OF INTEREST
& CONTROL CENTER
You control who can
access—or even see—
and control systems, and