Get to zero stealth oil gas prod_executive_overview_ch
Stop Cyber Attacks
DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
Your Goal. Our Mission.
Cybercrime is changing the way oil and natural gas
executives look at securing their facilities and
intellectual property. The fact that a virus infected
30,000 computers at one of the world’s largest oil
producers in Saudi Arabia, disrupted operations for
and gathered data from the company’s
is simply unacceptable. Remote oil
rigs, especially those at sea, depend on SCADA and
wireless and satellite communications to control
key aspects of drilling and extraction. According to a
report in Pipeline and Gas Journal, “…the introduction
of information technologies and connectivity through
systems and protocols such as Windows, Ethernet,
TCP/IP and wireless technologies within industrial
control devices has resulted in significantly less
isolation from the outside world.”3
In fact, according
to a report in Network World, “engineers took remote
control of the programmable logic controller (PLC)
Shankland, Stephen. Data theft attacks besiege oil industry, McAfee
says. CNET NEWS, February 12, 2011.
Kube, Nate. Cyber Security and SCADA in Critical Infrastructure.
Oil and Gas Journal, February 2013. http://pipelineandgasjournal.com/
Not cyber myths: Hacking oil rigs, water plants, industrial infrastructure.
Network World, August 5, 2013. http://www.networkworld.com/community/
on a simulation oil rig, turned the pumps on and off
so it sprayed liquid—which would have been an oil
pipeline rupture in real life—while sending data
that made it appear as if nothing happened.”
How can oil and gas companies protect their operations
and intellectual property against the tidal wave of
advanced persistent threats (APT) and keep ahead
of increasingly sophisticated cyber attacks? With
Unisys Stealth™, you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
Consolidate. Reduce reliance on physical
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
Keep Critical Infrastructure Secure
Stop Cyber Assaults
Before They Happen
Unisys Stealth takes a radically different approach
to addressing security concerns by making endpoints
such as ICS/SCADA and PLCs at remote production,
well-head, and refinery operations on the command
and control network invisible to unauthorized users
and by securing data-in-motion across any network.
This is how Stealth can help oil and gas production
companies Get to Zero Incidents.
By creating highly-trusted communities of interest
(COI), Stealth is designed to allow only authorized
users to access devices, applications, and systems
critical to the oil and gas production process. In
addition to strengthening mission-critical protection,
oil and gas organizations can reduce infrastructure
costs by safely modernizing their industrial controls
and software with one unified security solution. And
as regulatory mandates change, Stealth can deliver
the agility enterprises need without requiring costly
upgrades or extensive reconfiguration.
Why Stealth Now?
Unisys Stealth is the innovative, mission-critical
security that oil and gas production companies need to
help secure their intellectual property and operations:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation so you can upgrade
your systems without compromising security.
Reduces risk. Make pipeline, rig, well-head,
refinery, and ICS/SCADA systems invisible. Isolate
critical systems from the rest of the enterprise.
Tighten access control based on user identity. Shield
mobile applications and control from attack with
Facilitates compliance. Stealth can help achieve
compliance with the Executive Order on Improving
Critical Infrastructure Cybersecurity, and other
regulatory requirements and recommendations.
Reduces costs. Protect the oil and gas production
system, including sensitive financial, production, and
exploration data with one cost-effective solution.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving regulatory
requirements or mission/business needs.
You Can’t Hack What You Can’t See
STEALTH COMMUNITIES OF INTEREST
& CONTROL CENTER
You control who can
access—or even see—
and control systems, and