EXECUTIVE OVERVIEW
Stop Cyber Attacks
and Espionage
DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
Executive Overview2
Zero Incidents:
Your Goal. Our Mission.
Cybercrime is changing the way oil and natural gas
executives ...
Executive Overview3
Stop Cyber Assaults
Before They Happen
Unisys Stealth takes a radically different approach
to addressi...
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forwar...
Upcoming SlideShare
Loading in …5
×

Get to zero stealth oil gas prod_executive_overview_ch

136 views

Published on

Unisys Stealth Get to Zero Oil and Gas Production Executive Overview

Published in: Marketing, Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
136
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Get to zero stealth oil gas prod_executive_overview_ch

  1. 1. EXECUTIVE OVERVIEW Stop Cyber Attacks and Espionage DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
  2. 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. Cybercrime is changing the way oil and natural gas executives look at securing their facilities and intellectual property. The fact that a virus infected 30,000 computers at one of the world’s largest oil producers in Saudi Arabia, disrupted operations for several days,1 and gathered data from the company’s SCADA systems2 is simply unacceptable. Remote oil rigs, especially those at sea, depend on SCADA and wireless and satellite communications to control key aspects of drilling and extraction. According to a report in Pipeline and Gas Journal, “…the introduction of information technologies and connectivity through systems and protocols such as Windows, Ethernet, TCP/IP and wireless technologies within industrial control devices has resulted in significantly less isolation from the outside world.”3 In fact, according to a report in Network World, “engineers took remote control of the programmable logic controller (PLC) 1 Shankland, Stephen. Data theft attacks besiege oil industry, McAfee says. CNET NEWS, February 12, 2011. 2 Kube, Nate. Cyber Security and SCADA in Critical Infrastructure. Oil and Gas Journal, February 2013. http://pipelineandgasjournal.com/ cyber-security-and-scada-critical-infrastructure 3 Not cyber myths: Hacking oil rigs, water plants, industrial infrastructure. Network World, August 5, 2013. http://www.networkworld.com/community/ blog/not-cyber-myths-hacking-oil-rigs-water-plants-industrial-infrastructure on a simulation oil rig, turned the pumps on and off so it sprayed liquid—which would have been an oil pipeline rupture in real life—while sending data that made it appear as if nothing happened.” How can oil and gas companies protect their operations and intellectual property against the tidal wave of advanced persistent threats (APT) and keep ahead of increasingly sophisticated cyber attacks? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  3. 3. Executive Overview3 Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security concerns by making endpoints such as ICS/SCADA and PLCs at remote production, well-head, and refinery operations on the command and control network invisible to unauthorized users and by securing data-in-motion across any network. This is how Stealth can help oil and gas production companies Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized users to access devices, applications, and systems critical to the oil and gas production process. In addition to strengthening mission-critical protection, oil and gas organizations can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that oil and gas production companies need to help secure their intellectual property and operations: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make pipeline, rig, well-head, refinery, and ICS/SCADA systems invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Shield mobile applications and control from attack with high-level encryption. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect the oil and gas production system, including sensitive financial, production, and exploration data with one cost-effective solution. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. You Can’t Hack What You Can’t See STEALTH COMMUNITIES OF INTEREST NETWORK COMMAND & CONTROL CENTER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  4. 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Don’t Be a Target. Go Invisible. Contact us: Eastern Region: Paul Armstrong, 310-944-0833 paul.armstrong@unisys.com Central Region: Steve Walston, 972.629.4270 steve.walston@unisys.com Western Region: Loren Barnett, 303.518.5102 loren.barnett@unisys.com Federal: Sandy Holland, 703.447.4490 sandra.holland@unisys.com TOLA: Kim Henry, 469.939.0889 Kimberly.henry@unisys.com Business Development: Karen Walsh, 304.579.0391 karen.walsh@unisys.com Lari Young, 703.507.3401 lari.young@unisys.com Canada: Beverly Golchuk, 416.770.0662 beverly.golchuk@unisys.com UK: Simon Totterdell, +44 787.299.4090 simon.totterdell@unisys.com www.unisys.com/stealth

×