SECURITY CONVERGENCE TILITIES & CRITICAL NFRASTRUCTURES · 2019-12-02 · Delivering a Business Layer across Systems and Applications – Empower your business managers with a complete

Post on 10-Jul-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

SOLUTIONSHEET

ALERTENTERPRISE SOLUTIONS

ENTERPRISE GUARDIAN

ENTERPRISE SENTRY

IDENTITY INTELLIGENCE TECHNOLOGY

ENTERPRISE VISITOR IDENTITY MANAGEMENT

CAPABILITIES• Physical-LogicalIdentityandAccess

•Governance:Contractor/EmployeeOnboardingOffboarding

•ActiveEnforcementofNERCReliabilityStandards

•CyberCriticalAssetMonitoringandNERCCIPCompliance

•RemoteSubstation/ControlRoomMonitoring

•ComplexThreatPrevention–Cyber,PhysicalandAdvancedPersistentThreats

•EnhancedSOCOperations(SecurityOperationsCenter)

•SmartGridandAdvancedMeteringInfrastructureSecurity

INFO@ALERTENTERPRISE.COM | ALERTENTERPRISE.COM

[ 1+1+1 = 0 ]The New Math for Information Technology, Operational Technology and Physical Security for Secure Workforce and Workplace Access Management

Utilitiesareextra-criticalinfrastructureswithcomplexsecurityrequirements.Newsophisticatedthreatsthatliveinbothcyberandphysicaldomainsstandpoisedandreadytoattack—withpotential,ongoingrisktoIT,OperationalTechnology(OT),andPhysicalSecurity.Addressingtheseescalatingthreatsrequiresanewformulaandapproachwhere1+1+1equals0.Withtheobjectiveofzerocomplianceviolationsandanewlevelofsecurity,aconvergedsolutionisthebestwaytoclosethesecuritygapsanddeliverautomatedpolicyandcomplianceenforcement.

AlertEnterprisedeliversenterprise-widesecurity,governance,compliance,policyenforcement,automationandworkforcemanagementtotheUtilityandCriticalInfrastructuresectorsinasingleplatformthatmakesphysicalandlogicalaccessandidentitymanagementaseamlesspartofbusinessoperations.

SECURITY CONVERGENCEFOR UTILITIES & CRITICAL INFRASTRUCTURES

GSIV

REAL-WORLD INCIDENTSDEMAND A WORLD-CLASS RESPONSEAlertEnterpriseprovidesleadingIdentityandAccessGovernancealongwithSecurityIncidentManagementandResponsesoftwareforUtilitiesandCriticalInfrastructure.

ENTERPRISE IDENTITYAND ACCESS GOVERNANCEDelivering a Business Layer across Systems and Applications–Empoweryourbusinessmanagerswithacompleteviewofriskssotheycanmakeaccessandsecurity-relateddecisionswithoutexcessivedemandsonIT.Oursoftwareintegratesacrossenterpriseapplications,legacysystems,physicalfacilitiesandcriticalassets.

Identity Governance, Physical-Logical Convergence–Taketheguessworkoutofapprovingaccesstoapplicationsbasedonspecificroleswithintheorganization.Managephysicalaccesstofacilities,substations,controlroomsandpowergenerationstations–fromoneplace.

Automate Contractor / Employee Onboarding Off boarding–Real-timeintegrationwithleadingHRsystemssuchasSAPSuccessFactors,allowsyoutoconductupfrontriskanalysisfortheentirepopulation,streamliningandautomatingsecurephysicalaccessprovisioning.

IT-OT Convergence: Managing Access to Operational Systems–MonitorallyourOperationalsystems(EnergyManagementSystemsforTransmissionOperations,ProtectiveRelaysinSubstationsorGenerationManagement)whileprovidinggranularOTaccesscontrolpermissions.WithOTconvergence,oursoftwareallowsonlythosewithalegitimateneedtoaccesscriticalassets.

Operational Compliance Reporting–ExtendthecapabilitiesofcomplianceapplicationslikeSAPGRCtoincludemonitoringofNERCandNERCCIPcontrols,aswellasStateorLocalPublicUtilityCommissionGuidelines.

SOLUTIONSHEET

INFO@ALERTENTERPRISE.COM | ALERTENTERPRISE.COM

AlertEnterprise software extends beyond ITto include security and operational risk management for power generation, transmission, distribution and the Smart Grid, delivering operational security across the entire Utility and other Critical Infrastructure Enterprise.

• IDENTITY AND ACCESS GOVERNANCE

• CYBER AND PHYSICAL INCIDENT MANAGEMENT

• OPERATIONAL COMPLIANCE (NERC, CIP, ETC.)

ENTERPRISEGUARDIAN

ENTERPRISESENTRY

IDENTITYINTELLIGENCE

VISITOR IDENTITYMANAGEMENT

CYBER | IT

PHYSICAL

SCADA | OT

V

I

S

G

• IDENTITY AND ACCESS GOVERNANCE

• CYBER AND PHYSICAL INCIDENT MANAGEMENT

• OPERATIONAL COMPLIANCE (NERC, CIP, ETC.)

ENTERPRISEGUARDIAN

ENTERPRISESENTRY

IDENTITYINTELLIGENCE

VISITOR IDENTITYMANAGEMENT

CYBER | IT

PHYSICAL

SCADA | OT

V

I

S

G

SECURITY OPERATIONSAND THREAT PREVENTIONRemote Substation, Transmission Control Room Monitoring: MeetSCADA-relatedsecurityandsafetychallengeshead-on.AlertEnterprisesoftwareenablesyoursecuritypersonneltocorrelatestaffentryintosensitivelocationswithwork-orderissuanceaswellasprioraccesspatterns.

SOC Enhancement, Continuous Monitoring, Incident Management and Informed Response: CombinethemonitoringofbadgeaccessactivityviavideosurveillancewithIT,HRandcybersecurityrelatedinformationinasingleunifiedapplication.AlertEnterprisesoftwarecanleveragein-memoryfastcomputingcapabilitiesofSAP®HANA™tomineinformationthroughmillionsofevents,alertsandactionsforsplit-secondinformedresponse.

Smart Grid Security:Detectend-pointcyberattacksaswellasblendedphysical-logicalthreatsagainstgateways,head-endsandcontrolpoints,toensurereliabilityandprovideprotectionfrommaliciousthreatactors.

Nuclear Critical Digital Asset (CDA) Monitoring and Reporting:Proactivelyenforceprovisionsof10CFR73.54and73.55byautomatingthemonitoringandassessmentsforCyberDigitalAssets(CDAs).

Unified Threat Management: Physical Threats, Insider Threats, Cyber Threats and Advanced Persistent Threats: Gainaunifiedviewofthreatsacrosstheenterpriseanddeployrules-basedsolutionstopreventmaliciousacts,sabotage,terrorismandcyberthreats.

NERC CIP COMPLIANCEEnable security, risk and compliance management professionalswithinyourorganizationtonotonlydetectandidentifyviolations,buttoremediatetheminreal-time.Oursoftwareenablesyoursecuritystafftoremovephysicalaccesstosystemsandfacilitieswithasingleclickandinvokemitigatingcontrolslikeadditionalvideosurveillanceorproximitytracking.

SOLUTIONSHEET

INFO@ALERTENTERPRISE.COM | ALERTENTERPRISE.COM

©2019AlertEnterpriseInc.Allrightsreserved.AlertEnterprise,EnterpriseGuardianaretrademarksofAlertEnterpriseInc.Othernamesandlogosmentionedhereinmaybethetrademarksoftheirrespectiveowners.

With the objective of zero compliance violations and a new level of security, a converged solution is the best way to close the security gaps and deliver automated policy and compliance enforcement.

top related