SlideShare a Scribd company logo
1 of 4
Download to read offline
1
Fortinet & Nozomi Networks
Securing ICS
The Challenge of Securing Industrial Control Systems
Industrial Control Systems (ICS) including Supervisory Control and Data
Acquisition (SCADA) systems have, in recent years, come under attack.
STUXNET and BlackEnergy are examples of malware that have negatively
impacted ICS systems with significant consequences. The questions that should
be asked are why this is happening and should we be worried? Quite simply,
these attacks are indicative of the vulnerability of ICS systems and the potential
damage to the critical infrastructure that relies on them.
ICS systems were initially designed at a time when Operational Technology (OT)
networks were analog, proprietary systems with little to no connectivity to the
outside world. Their security stemmed from their relative isolation. However, the
advantages of leveraging common Internet protocols, combined with the ease
and cost saving of using Windows based terminals such as HMIs and SCADA
Masters brought OT networks on a collision course with traditional IT systems
and their security issues. There were two key issues with this transformation.
First, ICS networks involved with critical infrastructure can’t afford any
unexpected outages, even for maintenance or basic update patching, leaving
the Windows based terminals vulnerable. The second issue is that the serial
protocols of ICS systems, which were merely encapsulated in TCP/IP, did not
have any security features built into them, like authentication or encryption.
Once interconnected with a corporate network, ICS systems are exposed to the
same potential cyber threats and damage that we see with regular IT security
breaches (financial loss, data theft, etc…) but with an additional layer of risk such
as critical infrastructure disruption that has national security implications and the
SOLUTION BRIEF
Market Drivers
n	 As the backbone of critical 		
	 infrastructure, ICS is ubiquitous in all 	
	 industries including Energy, Transport, 	
	 Electric, Water, etc…
n	 ICS networks are vulnerable and 		
	 exposed to IT security threats
n	 ICS security incidents have increased 	
	 in frequency with disastrous results 	
	 including loss of life, major outages, 	
	 billions in lost revenue, and large scale 	
	 infrastructure damage.
Solutions Highlights
n	 The Fortinet – Nozomi Networks 	
	 solution combines sophisticated 	
	 detection of ICS security issues 	
	 with proactive threat remediation 	
	 and containment.
n	 Applying segmentation within
	 the ICS network, the joint 		
	 solution scales to large ICS 		
	 deployments making them even 	
	 more secure.
2 	 www.fortinet.com
SOLUTION BRIEF: FORTINET & NOZOMI NETWORKS SECURING ICS
potential loss of life. For example, according to the Federal
Office for Information Security in Germany, a targeted attack
in 2014 on a steel mill using spear phishing e-mails along
with social engineering was able to gain initial access to the
steel mill’s IT network which then led the hackers to the OT
network. The impact was the uncontrolled shutdown of a
blast furnace leading to massive damage and a long outage.
Due to the unplanned plant outage, the damage usually starts
with hundreds of thousands of Euros in equipment repair and
can potentially lead to millions in lost revenue.
Solving these issues requires a solution that unifies the best
of current IT network security capabilities with an extensive
understanding of the ICS world and its processes and
protocols.
The Fortinet-Nozomi Networks Joint Solution
Takes on the ICS Security Challenge
Fortinet and Nozomi Networks are collaborating to provide
ICS environments a holistic security solution. The solution
combines Nozomi Networks’ SCADAguardian and its deep
understanding of ICS networks, protocols, and device
behavior with Fortinet’s extensive network security expertise
through its FortiGate enterprise firewall. SCADAguardian’s
non-intrusive ICS protocol monitoring capabilities profile the
behavior of industrial devices and detect anomalies in the
ICS network. It works closely with FortiGate to respond
and provide a secure gateway between the OT and IT
networks as shown in Figure 1. Designed to minimize system
downtime and limit data loss, the Fortinet-Nozomi Networks
solution optimizes productivity and business continuity in
industries reliant on ICS networks.
How do we do this? By placing a Nozomi Networks
SCADAguardian appliance in the OT network, it will passively
monitor the network traffic creating an internal representation
of the entire network, its nodes, and the state and behavior
of each device in the network. If an anomaly or suspicious
behavior is detected, an alarm is generated and sent to
security operators and network administrators. At the same
time, SCADAguardian is capable of automatically modifying
the right policy in FortiGate to block the suspicious traffic. But
to scale the solution deeper into the ICS network, a tiered
architectural approach is needed.
Fig. 1: Safe gateway between the OT and IT networks.
CORPORATE NETWORK INDUSTRIAL NETWORK
Remote Access Business
Historian
FORTINET
NOZOMI
Scada Master HMI Operator
PLC/RTU
3
SOLUTION BRIEF: FORTINET & NOZOMI NETWORKS SECURING ICS
Fortinet and Nozomi Networks Take ICS
Security to the Next Level
With the adoption of standard IP networking, the typical
ICS network followed normal networking conventions
which meant that it was relatively flat and open. This lack
of segmentation meant that once a threat was able to get
into the system, it could move at will, increasing the amount
of damage it could cause. IT networks address this issue
by using firewalls to segment their internal networks so that
malware can be contained to only a portion of the network.
This same protection can be applied to ICS networks by
deploying FortiGate/SCADAguardian pairs deeper into the
ICS network, as shown in Figure 2, scaling the solution
across the whole of the ICS network and providing a greater
granularity of protection.
In short, the active integration between SCADAguardian
and FortiGate provides ICS environments with the most
comprehensive security solution and enables optimum
efficiency within the Industrial network.
Level 4
Corporate Network IT
Level 2
Supervisory
HMI LAN
Level 1
Controller LAN
Level 0
Instrumentation
bus network
SCADA, DCS, or
EMS System #1
Local HMI
SCADA, DCS, or
EMS System #2
Local HMI
SCADA, DCS, or
EMS System #3
Local HMI
FortiGate
Rugged Firewall
Level 3
Operations DMZ
FortiGate
Firewall
FortiGate
Rugged Firewall
FortiGate
Rugged Firewall
FortiGate
Rugged Firewall
Fig. 2: Segmenting ICS networks with FortiGate/SCADAguardian pairs
SOLUTION BRIEF: FORTINET & NOZOMI SECURING ICS
About Fortinet and Nozomi Networks
Fortinet (NASDAQ: FTNT) is a global provider of high-performance network security and specialized security solutions that
provide our customers with the power to protect and control their IT infrastructure. Our purpose-built, integrated security
technologies, combined with our FortiGuard security intelligence services, provide the high performance and complete content
protection our customers need to stay abreast of a constantly evolving threat landscape. More than 265,000 customers around
the world are utilizing Fortinet’s broad and deep portfolio to improve their security posture, simplify their infrastructure, and
reduce their overall cost of ownership. From endpoints and mobile devices, to the perimeter and the core - including databases,
messaging and Web applications - Fortinet helps protect the constantly evolving networks in every industry and region around
the world. Learn more at http://www.fortinet.com.
Nozomi Networks is a leading provider of real-time visibility, advanced monitoring capabilities, and strong security for industrial
control networks supporting critical infrastructure. Built by a team of industrial SecOps, Nozomi’s SCADAguardian appliances
inspect industrial networks non-intrusively and apply machine-learning technology to provide unique insight into the topology,
devices, and behaviors present in it. Customers of Nozomi Networks are able to detect anomalies, malfunctions, and suspicious
activities caused by malicious insiders or cyber-attacks. Nozomi Networks has been deployed in some of the largest industrial
installations, providing some of the fastest return-on–investment in the industry.
For more information visit: http://www.nozominetworks.com
GLOBAL HEADQUARTERS
Fortinet Inc.
899 Kifer Road
Sunnyvale, CA 94086
United States
Tel: +1.408.235.7700
www.fortinet.com/sales
EMEA SALES OFFICE
905 rue Albert Einstein
06560, Sophia Antipolis,
France
Tel: +33.4.8987.0510
APAC SALES OFFICE
300 Beach Road 20-01
The Concourse
Singapore 199555
Tel: +65.6513.3730
LATIN AMERICA SALES OFFICE
Prol. Paseo de la Reforma 115 Int. 702
Col. Lomas de Santa Fe,
C.P. 01219
Del. Alvaro Obregón
México D.F.
Tel: 011-52-(55) 5524-8480
Copyright © 2016 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or
company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other resultsmay vary. Network variables, different network environments and other conditions
may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly
warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be
limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication
without notice, and the most current version of the publication shall be applicable. Sep 15, 2016 4:11 PM Mac:Users:susiehwang:Desktop:Susie Projects:2016:Alliance-Solution-Briefs:SB-Fortinet & Nozomi Securing ICS:SB-Fortinet & Nozomi Networks Securing ICS-A4

More Related Content

What's hot

Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringWaterfall Security Solutions
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET Journal
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019TI Safe
 
Demilitarized network to secure the data stored in industrial networks
Demilitarized network to secure the data stored in  industrial networks Demilitarized network to secure the data stored in  industrial networks
Demilitarized network to secure the data stored in industrial networks IJECEIAES
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisTI Safe
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...TI Safe
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)TI Safe
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAndy Taylor
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security TrainingBryan Len
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 

What's hot (20)

Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019
 
Demilitarized network to secure the data stored in industrial networks
Demilitarized network to secure the data stored in  industrial networks Demilitarized network to secure the data stored in  industrial networks
Demilitarized network to secure the data stored in industrial networks
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 

Viewers also liked

AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)
AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)
AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)Rick Roulston
 
Matthew 10 commentary
Matthew 10 commentaryMatthew 10 commentary
Matthew 10 commentaryGLENN PEASE
 
The statutory authority of agencies
The statutory authority of agenciesThe statutory authority of agencies
The statutory authority of agenciestaratoot
 
Garrett fitzgerald - Clinical and Translational Research in the USA - 2009
Garrett fitzgerald - Clinical and Translational Research in the USA - 2009Garrett fitzgerald - Clinical and Translational Research in the USA - 2009
Garrett fitzgerald - Clinical and Translational Research in the USA - 2009ipposi
 
Wireless (Small Cell) challenges for California Cities & Counties
Wireless (Small Cell) challenges for California Cities & CountiesWireless (Small Cell) challenges for California Cities & Counties
Wireless (Small Cell) challenges for California Cities & CountiesOmar Masry, AICP
 
State of the 2017 Amazon Marketplace
State of the 2017 Amazon MarketplaceState of the 2017 Amazon Marketplace
State of the 2017 Amazon MarketplaceTinuiti
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part IAngelo Corsaro
 

Viewers also liked (14)

IDME Company Profile 2017
IDME Company Profile 2017IDME Company Profile 2017
IDME Company Profile 2017
 
AT@
AT@AT@
AT@
 
CV
CVCV
CV
 
AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)
AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)
AT&T TRANSFORMATION 2020 (1)_Microsoft_ (1)
 
Matthew 10 commentary
Matthew 10 commentaryMatthew 10 commentary
Matthew 10 commentary
 
what christ was made
what christ was madewhat christ was made
what christ was made
 
The statutory authority of agencies
The statutory authority of agenciesThe statutory authority of agencies
The statutory authority of agencies
 
Masa Israel Programs Overview
Masa Israel Programs OverviewMasa Israel Programs Overview
Masa Israel Programs Overview
 
Garrett fitzgerald - Clinical and Translational Research in the USA - 2009
Garrett fitzgerald - Clinical and Translational Research in the USA - 2009Garrett fitzgerald - Clinical and Translational Research in the USA - 2009
Garrett fitzgerald - Clinical and Translational Research in the USA - 2009
 
Wireless (Small Cell) challenges for California Cities & Counties
Wireless (Small Cell) challenges for California Cities & CountiesWireless (Small Cell) challenges for California Cities & Counties
Wireless (Small Cell) challenges for California Cities & Counties
 
Electrical traction
Electrical traction Electrical traction
Electrical traction
 
State of the 2017 Amazon Marketplace
State of the 2017 Amazon MarketplaceState of the 2017 Amazon Marketplace
State of the 2017 Amazon Marketplace
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part I
 
Internet Marketing Insight 2017
Internet Marketing Insight 2017 Internet Marketing Insight 2017
Internet Marketing Insight 2017
 

Similar to Sb fortinet-nozomi

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetIvan Carmona
 
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...Sun Telecom
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-enVahid RG-zadeh
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security vSYYULIANISKOMMT
 
Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...Polestar IIoT
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 

Similar to Sb fortinet-nozomi (20)

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...Bringing manufacturing in house with secure IIoT communications | Siemens & P...
Bringing manufacturing in house with secure IIoT communications | Siemens & P...
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
NX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT InterfaceNX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT Interface
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 

Recently uploaded (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

Sb fortinet-nozomi

  • 1. 1 Fortinet & Nozomi Networks Securing ICS The Challenge of Securing Industrial Control Systems Industrial Control Systems (ICS) including Supervisory Control and Data Acquisition (SCADA) systems have, in recent years, come under attack. STUXNET and BlackEnergy are examples of malware that have negatively impacted ICS systems with significant consequences. The questions that should be asked are why this is happening and should we be worried? Quite simply, these attacks are indicative of the vulnerability of ICS systems and the potential damage to the critical infrastructure that relies on them. ICS systems were initially designed at a time when Operational Technology (OT) networks were analog, proprietary systems with little to no connectivity to the outside world. Their security stemmed from their relative isolation. However, the advantages of leveraging common Internet protocols, combined with the ease and cost saving of using Windows based terminals such as HMIs and SCADA Masters brought OT networks on a collision course with traditional IT systems and their security issues. There were two key issues with this transformation. First, ICS networks involved with critical infrastructure can’t afford any unexpected outages, even for maintenance or basic update patching, leaving the Windows based terminals vulnerable. The second issue is that the serial protocols of ICS systems, which were merely encapsulated in TCP/IP, did not have any security features built into them, like authentication or encryption. Once interconnected with a corporate network, ICS systems are exposed to the same potential cyber threats and damage that we see with regular IT security breaches (financial loss, data theft, etc…) but with an additional layer of risk such as critical infrastructure disruption that has national security implications and the SOLUTION BRIEF Market Drivers n As the backbone of critical infrastructure, ICS is ubiquitous in all industries including Energy, Transport, Electric, Water, etc… n ICS networks are vulnerable and exposed to IT security threats n ICS security incidents have increased in frequency with disastrous results including loss of life, major outages, billions in lost revenue, and large scale infrastructure damage. Solutions Highlights n The Fortinet – Nozomi Networks solution combines sophisticated detection of ICS security issues with proactive threat remediation and containment. n Applying segmentation within the ICS network, the joint solution scales to large ICS deployments making them even more secure.
  • 2. 2 www.fortinet.com SOLUTION BRIEF: FORTINET & NOZOMI NETWORKS SECURING ICS potential loss of life. For example, according to the Federal Office for Information Security in Germany, a targeted attack in 2014 on a steel mill using spear phishing e-mails along with social engineering was able to gain initial access to the steel mill’s IT network which then led the hackers to the OT network. The impact was the uncontrolled shutdown of a blast furnace leading to massive damage and a long outage. Due to the unplanned plant outage, the damage usually starts with hundreds of thousands of Euros in equipment repair and can potentially lead to millions in lost revenue. Solving these issues requires a solution that unifies the best of current IT network security capabilities with an extensive understanding of the ICS world and its processes and protocols. The Fortinet-Nozomi Networks Joint Solution Takes on the ICS Security Challenge Fortinet and Nozomi Networks are collaborating to provide ICS environments a holistic security solution. The solution combines Nozomi Networks’ SCADAguardian and its deep understanding of ICS networks, protocols, and device behavior with Fortinet’s extensive network security expertise through its FortiGate enterprise firewall. SCADAguardian’s non-intrusive ICS protocol monitoring capabilities profile the behavior of industrial devices and detect anomalies in the ICS network. It works closely with FortiGate to respond and provide a secure gateway between the OT and IT networks as shown in Figure 1. Designed to minimize system downtime and limit data loss, the Fortinet-Nozomi Networks solution optimizes productivity and business continuity in industries reliant on ICS networks. How do we do this? By placing a Nozomi Networks SCADAguardian appliance in the OT network, it will passively monitor the network traffic creating an internal representation of the entire network, its nodes, and the state and behavior of each device in the network. If an anomaly or suspicious behavior is detected, an alarm is generated and sent to security operators and network administrators. At the same time, SCADAguardian is capable of automatically modifying the right policy in FortiGate to block the suspicious traffic. But to scale the solution deeper into the ICS network, a tiered architectural approach is needed. Fig. 1: Safe gateway between the OT and IT networks. CORPORATE NETWORK INDUSTRIAL NETWORK Remote Access Business Historian FORTINET NOZOMI Scada Master HMI Operator PLC/RTU
  • 3. 3 SOLUTION BRIEF: FORTINET & NOZOMI NETWORKS SECURING ICS Fortinet and Nozomi Networks Take ICS Security to the Next Level With the adoption of standard IP networking, the typical ICS network followed normal networking conventions which meant that it was relatively flat and open. This lack of segmentation meant that once a threat was able to get into the system, it could move at will, increasing the amount of damage it could cause. IT networks address this issue by using firewalls to segment their internal networks so that malware can be contained to only a portion of the network. This same protection can be applied to ICS networks by deploying FortiGate/SCADAguardian pairs deeper into the ICS network, as shown in Figure 2, scaling the solution across the whole of the ICS network and providing a greater granularity of protection. In short, the active integration between SCADAguardian and FortiGate provides ICS environments with the most comprehensive security solution and enables optimum efficiency within the Industrial network. Level 4 Corporate Network IT Level 2 Supervisory HMI LAN Level 1 Controller LAN Level 0 Instrumentation bus network SCADA, DCS, or EMS System #1 Local HMI SCADA, DCS, or EMS System #2 Local HMI SCADA, DCS, or EMS System #3 Local HMI FortiGate Rugged Firewall Level 3 Operations DMZ FortiGate Firewall FortiGate Rugged Firewall FortiGate Rugged Firewall FortiGate Rugged Firewall Fig. 2: Segmenting ICS networks with FortiGate/SCADAguardian pairs
  • 4. SOLUTION BRIEF: FORTINET & NOZOMI SECURING ICS About Fortinet and Nozomi Networks Fortinet (NASDAQ: FTNT) is a global provider of high-performance network security and specialized security solutions that provide our customers with the power to protect and control their IT infrastructure. Our purpose-built, integrated security technologies, combined with our FortiGuard security intelligence services, provide the high performance and complete content protection our customers need to stay abreast of a constantly evolving threat landscape. More than 265,000 customers around the world are utilizing Fortinet’s broad and deep portfolio to improve their security posture, simplify their infrastructure, and reduce their overall cost of ownership. From endpoints and mobile devices, to the perimeter and the core - including databases, messaging and Web applications - Fortinet helps protect the constantly evolving networks in every industry and region around the world. Learn more at http://www.fortinet.com. Nozomi Networks is a leading provider of real-time visibility, advanced monitoring capabilities, and strong security for industrial control networks supporting critical infrastructure. Built by a team of industrial SecOps, Nozomi’s SCADAguardian appliances inspect industrial networks non-intrusively and apply machine-learning technology to provide unique insight into the topology, devices, and behaviors present in it. Customers of Nozomi Networks are able to detect anomalies, malfunctions, and suspicious activities caused by malicious insiders or cyber-attacks. Nozomi Networks has been deployed in some of the largest industrial installations, providing some of the fastest return-on–investment in the industry. For more information visit: http://www.nozominetworks.com GLOBAL HEADQUARTERS Fortinet Inc. 899 Kifer Road Sunnyvale, CA 94086 United States Tel: +1.408.235.7700 www.fortinet.com/sales EMEA SALES OFFICE 905 rue Albert Einstein 06560, Sophia Antipolis, France Tel: +33.4.8987.0510 APAC SALES OFFICE 300 Beach Road 20-01 The Concourse Singapore 199555 Tel: +65.6513.3730 LATIN AMERICA SALES OFFICE Prol. Paseo de la Reforma 115 Int. 702 Col. Lomas de Santa Fe, C.P. 01219 Del. Alvaro Obregón México D.F. Tel: 011-52-(55) 5524-8480 Copyright © 2016 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other resultsmay vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Sep 15, 2016 4:11 PM Mac:Users:susiehwang:Desktop:Susie Projects:2016:Alliance-Solution-Briefs:SB-Fortinet & Nozomi Securing ICS:SB-Fortinet & Nozomi Networks Securing ICS-A4