Top Banner
EXECUTIVE OVERVIEW Keep Water Supplies Safe from Cyber Threats DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
4

Get to zero stealth water supply treatment_executive_overview_ch

Jul 21, 2015

Download

Business

Sherid444
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Get to zero stealth water supply treatment_executive_overview_ch

EXECUTIVE OVERVIEW

Keep Water Supplies Safe from Cyber Threats

DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.

Page 2: Get to zero stealth water supply treatment_executive_overview_ch

Executive Overview2

Zero Incidents: Your Goal. Our Mission.To provide safe water for public use, water distribution

and treatment utilities have heavily invested in

automated systems to improve reliability, safety,

and to meet ever-stricter regulatory demands.

These modernized systems are increasingly

dependent on Remote Telemetry Units (RTUs),

Industrial Control Systems (ICS) and Supervisory

Control and Data Acquisition systems (SCADA).

These systems are critical to not just the monitoring

and efficient distribution of our water supply, but

also are critical in areas such as water filtration

and chlorine, ammonia, and fluoride dosing. But

these components are in the cross-hairs of

Advanced Persistent Threats (APT) and many other

cyber-threats. Primary targets include:

1) ICS/SCADA and related RTUs. These systems

make up nearly seven percent of the entire SCADA

installed base.1 This amounts to hundreds of

thousands of targeted water control units. As demand

and greater water conservation and treatment

technologies improve, water utilities will deploy even

more ICS/SCADA/RTUs.

1 Frost & Sullivan, Strategic Analysis of the Global SCADA Market, March 2013

2) Command and control centers. These remote

units and controls are routed through central

command centers at most utilities. However,

the communication to and from these field units

is over a variety of mediums: radio, wireless,

and Ethernet connections to the centers’ Human-

Machine Interfaces (HMIs).

How can water treatment facilities strengthen mission-

critical security, reduce costs, and increase agility—

all at the same time? With Unisys Stealth™, you can:

Go invisible. Make servers, devices, and other

endpoints dark and undetectable to hackers and

unauthorized users inside and outside your enterprise.

Isolate segments of your data center based

on user identity. Define and control access to

mission-critical systems and information based

on need-to-know access.

Secure data-in-motion. Protect data with

point-to-point encryption.

Consolidate. Reduce reliance on physical

IT infrastructure.

Scale and adapt. Upgrade legacy systems, easily

meet emerging needs and compliance requirements

with agile, software-based security.

Keep Critical Infrastructure Secure

Page 3: Get to zero stealth water supply treatment_executive_overview_ch

Executive Overview3

STEALTH COMMUNITIES OF INTEREST

Stop Cyber Assaults Before They HappenUnisys Stealth takes a radically different approach

to addressing security concerns by making ICS/

SCADA/RTU endpoints and the command and

control center network invisible to unauthorized

users and by securing data-in-motion across any

network. This is how Stealth can help water utilities

Get to Zero Incidents.

By creating highly-trusted Communities of Interest

(COI), Stealth is designed to allow only authorized

users to access devices, applications, or systems

critical to water supplies and water treatment

facilities. In addition to strengthening mission-

critical protection, water treatment utilities can

reduce infrastructure costs by safely modernizing

their industrial controls and software with one unified

security solution. And as regulatory mandates change,

Stealth can deliver the agility utilities need without

requiring costly upgrades or extensive reconfiguration.

Why Stealth Now?Unisys Stealth is the innovative, mission-critical

security that water utilities need to help maintain

reliability, safety, and security:

No operational disruption. Stealth works with existing

firewall, intrusion detection, and other security

systems with easy installation so you can upgrade

your systems without compromising security.

Reduces risk. Make RTU and ICS/SCADA endpoints

invisible. Isolate critical systems from the rest

of the enterprise. Tighten access control based

on user identity. Protect data-in-motion with

high-level encryption.

Facilitates compliance. Stealth can help achieve

compliance with the Executive Order on Improving

Critical Infrastructure Cybersecurity, and other

regulatory requirements and recommendations.

Reduces costs. Protect the water utility enterprise,

including customer data, accounting, and distribution

and treatment with one cost-effective security solution.

Improves agility. Stealth allows for quick, easy

changes to accommodate rapidly evolving regulatory

requirements or mission/business needs.

You Can’t Hack What You Can’t See

NETWORK COMMAND & CONTROL CENTER

TRUSTED USER (COI)

TRUSTED USER (COI)

UNAUTHORIZED USER

Go Invisible. You control who can access—or even see—SCADA/ICS, command and control systems, and other endpoints.

x

Page 4: Get to zero stealth water supply treatment_executive_overview_ch

© 2014 Unisys Corporation. All rights reserved.

Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.

Stealth is What Innovative Security Looks LikeWhen it comes to critical infrastructure, there

can be no compromise. Stealth can help move

your organization from vulnerable to mission-

critically secure. But don’t take our word for it.

Read Network World’s May 2014 independent

review of Stealth and see why Stealth might

just be “a great way to hide from hackers.”

www.unisys.com/gettozero

Don’t Be a Target. Go Invisible.

Contact us:

Eastern Region:Paul Armstrong, [email protected]

Central Region:Steve Walston, [email protected]

Western Region:Loren Barnett, [email protected]

Federal:Sandy Holland, [email protected]

TOLA:Kim Henry, [email protected]

Business Development:Karen Walsh, [email protected]

Lari Young, [email protected]

Canada:Beverly Golchuk, [email protected]

UK:Simon Totterdell, +44 [email protected]/stealth