Top Banner
EXECUTIVE OVERVIEW Protect Production and Intellectual Property UNISYS STEALTH ACCELERATES TIME-TO-MARKET WITHOUT SACRIFICING SAFETY AND SECURITY
4
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Get to zero stealth industrial manufacturing_executive_overview_ch

EXECUTIVE OVERVIEW

Protect Production and Intellectual Property

UNISYS STEALTH ACCELERATES TIME-TO-MARKET WITHOUT SACRIFICING SAFETY AND SECURITY

Page 2: Get to zero stealth industrial manufacturing_executive_overview_ch

Executive Overview2

Zero Incidents: Your Goal. Our Mission.Today, most automated manufacturing process

systems are connected to business networks.

As a result, modern industrial automation controls

and human-machine interfaces (HMIs) run on the

same hardware and software as their business

networks, such as Intel processors and Microsoft

Windows or Linux operating systems. Because of

the interconnected world of modern manufacturing,

industrial controls are subject to malicious code that

can propagate throughout the entire manufacturing

execution system (MES) and machine to machine

(M2M) environment. According to a report in

Engineering and Technology, “Key information

regarding vulnerabilities in Industrial Control Systems

(ICS) and Supervisory Control and Data Acquisition

(SCADA) systems is now openly available from a

range of sources on the public Internet.”1

In addition, legacy control systems, never meant

to interface or be exposed to common IP-based

networks, may be especially vulnerable as they

were not designed to operate in such a highly

1 Hayes, Jim. Critical infrastructure hack data found in public domain. Engineering and Technology Magazine, January 28, 2014.

interconnected environment. Manufacturers must pro-

tect both types of controls: “black box” legacy controls

and more modern, microprocessor-based systems.2

How can manufacturers protect their critical process

controls and enterprise assets from advanced

persistent threats (APT) and other sophisticated

cyber threats while also accelerating time-to-market

and reducing costs? With Unisys Stealth™, you can:

Go invisible. Make servers, devices, and other

endpoints dark and undetectable to hackers and

unauthorized users inside and outside your enterprise.

Isolate segments of your data center based

on user identity. Define and control access to

mission-critical systems and information based

on need-to-know access.

Secure data-in-motion. Protect data with

point-to-point encryption.

Consolidate. Reduce reliance on physical

IT infrastructure.

Scale and adapt. Upgrade legacy systems, easily

meet emerging needs and compliance requirements

with agile, software-based security.

2 Pinto, Jim. Automation & IT systems are different. Automation.com http://www.automation.com/library/articles-white-papers/articles-by-jim-pinto/automation-systems-cyber-security

Keep Critical Infrastructure Secure

Page 3: Get to zero stealth industrial manufacturing_executive_overview_ch

Executive Overview3

STEALTH COMMUNITIES OF INTEREST

Stop Cyber Assaults Before They HappenUnisys Stealth takes a radically different approach

to addressing security threats by making endpoints

such as SCADA/ICS and PLCs on HMI and M2M

networks invisible to unauthorized users and by

securing data-in-motion across any network.

This is how Stealth can help industrial organizations

Get to Zero Incidents.

By creating highly-trusted communities of interest

(COI), Stealth is designed to allow only authorized

users to access devices, applications, and systems

critical to manufacturing system infrastructure.

Intellectual property can be protected from theft,

and production lines and systems can be secure.

In addition to strengthening mission-critical protection,

manufacturing organizations can reduce infrastructure

costs by safely modernizing their industrial controls

and software with one unified security solution. And

as regulatory mandates change, Stealth can deliver

the agility enterprises need without requiring costly

upgrades or extensive reconfiguration.

Why Stealth Now?Unisys Stealth is the innovative, mission-critical

security that industrial manufacturing organizations

need to help improve safety and secure their supply:

No operational disruption. Stealth works with existing

firewall, intrusion detection, and other security

systems with easy installation so you can upgrade

your systems without compromising security.

Reduces risk. Make network-operated ICS/SCADA

devices invisible. Isolate critical systems from the

rest of the enterprise. Tighten access control based

on user identity.

Facilitates compliance. Stealth can help achieve

compliance with the Executive Order on Improving

Critical Infrastructure Cybersecurity, and other

regulatory requirements and recommendations.

Reduces costs. Protect enterprise customer data,

accounting, production, and ICS/SCADA with one

cost-effective security solution—Stealth can cover

both business and supply processes.

Improves agility. Stealth allows for quick, easy

changes to accommodate rapidly evolving regulatory

requirements or mission/business needs.

You Can’t Hack What You Can’t See

STEALTH COMMUNITIES OF INTEREST

NETWORK COMMAND & CONTROL CENTER

Go Invisible. You control who can access—or even see—SCADA/ICS, command and control systems, and other endpoints.

TRUSTED USER (COI)

TRUSTED USER (COI)

UNAUTHORIZED USER

x

Page 4: Get to zero stealth industrial manufacturing_executive_overview_ch

© 2014 Unisys Corporation. All rights reserved.

Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.

Stealth is What Innovative Security Looks LikeWhen it comes to critical infrastructure, there

can be no compromise. Stealth can help move

your organization from vulnerable to mission-

critically secure. But don’t take our word for it.

Read Network World’s May 2014 independent

review of Stealth and see why Stealth might

just be “a great way to hide from hackers.”

www.unisys.com/gettozero

Protect What Matters Most

Contact us:

Eastern Region:Paul Armstrong, [email protected]

Central Region:Steve Walston, [email protected]

Western Region:Loren Barnett, [email protected]

Federal:Sandy Holland, [email protected]

TOLA:Kim Henry, [email protected]

Business Development:Karen Walsh, [email protected]

Lari Young, [email protected]

Canada:Beverly Golchuk, [email protected]

UK:Simon Totterdell, +44 [email protected]/stealth