SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
EXECUTIVE OVERVIEW
Keep Water Supplies Safe
from Cyber Threats
DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
Executive Overview2
Zero Incidents:
Your Goal. Our Mission.
To provide safe water for public use, water distribution
and treatment utilities have heavily invested in
automated systems to improve reliability, safety,
and to meet ever-stricter regulatory demands.
These modernized systems are increasingly
dependent on Remote Telemetry Units (RTUs),
Industrial Control Systems (ICS) and Supervisory
Control and Data Acquisition systems (SCADA).
These systems are critical to not just the monitoring
and efficient distribution of our water supply, but
also are critical in areas such as water filtration
and chlorine, ammonia, and fluoride dosing. But
these components are in the cross-hairs of
Advanced Persistent Threats (APT) and many other
cyber-threats. Primary targets include:
1) ICS/SCADA and related RTUs. These systems
make up nearly seven percent of the entire SCADA
installed base.1
This amounts to hundreds of
thousands of targeted water control units. As demand
and greater water conservation and treatment
technologies improve, water utilities will deploy even
more ICS/SCADA/RTUs.
1
	Frost & Sullivan, Strategic Analysis of the Global SCADA Market,
March 2013
2) Command and control centers. These remote
units and controls are routed through central
command centers at most utilities. However,
the communication to and from these field units
is over a variety of mediums: radio, wireless,
and Ethernet connections to the centers’ Human-
Machine Interfaces (HMIs).
How can water treatment facilities strengthen mission-
critical security, reduce costs, and increase agility—
all at the same time? With Unisys Stealth™, you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
point-to-point encryption.
Consolidate. Reduce reliance on physical
IT infrastructure.
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
Keep Critical Infrastructure Secure
Executive Overview3
STEALTH COMMUNITIES OF INTEREST
Stop Cyber Assaults
Before They Happen
Unisys Stealth takes a radically different approach
to addressing security concerns by making ICS/
SCADA/RTU endpoints and the command and
control center network invisible to unauthorized
users and by securing data-in-motion across any
network. This is how Stealth can help water utilities
Get to Zero Incidents.
By creating highly-trusted Communities of Interest
(COI), Stealth is designed to allow only authorized
users to access devices, applications, or systems
critical to water supplies and water treatment
facilities. In addition to strengthening mission-
critical protection, water treatment utilities can
reduce infrastructure costs by safely modernizing
their industrial controls and software with one unified
security solution. And as regulatory mandates change,
Stealth can deliver the agility utilities need without
requiring costly upgrades or extensive reconfiguration.
Why Stealth Now?
Unisys Stealth is the innovative, mission-critical
security that water utilities need to help maintain
reliability, safety, and security:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation so you can upgrade
your systems without compromising security.
Reduces risk. Make RTU and ICS/SCADA endpoints
invisible. Isolate critical systems from the rest
of the enterprise. Tighten access control based
on user identity. Protect data-in-motion with
high-level encryption.
Facilitates compliance. Stealth can help achieve
compliance with the Executive Order on Improving
Critical Infrastructure Cybersecurity, and other
regulatory requirements and recommendations.
Reduces costs. Protect the water utility enterprise,
including customer data, accounting, and distribution
and treatment with one cost-effective security solution.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving regulatory
requirements or mission/business needs.
You Can’t Hack What You Can’t See
NETWORK COMMAND
& CONTROL CENTER
TRUSTED
USER
(COI)
TRUSTED
USER
(COI)
UNAUTHORIZED
USER
Go Invisible.
You control who can
access—or even see—
SCADA/ICS, command
and control systems, and
other endpoints.
x
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo
are registered trademarks or trademarks of Unisys Corporation. All other brands and products
referenced herein are acknowledged to be trademarks or registered trademarks of their
respective holders.
Stealth is What
Innovative Security
Looks Like
When it comes to critical infrastructure, there
can be no compromise. Stealth can help move
your organization from vulnerable to mission-
critically secure. But don’t take our word for it.
Read Network World’s May 2014 independent
review of Stealth and see why Stealth might
just be “a great way to hide from hackers.”
www.unisys.com/gettozero
Contact us:
stealth@unisys.com
Don’t Be a Target. Go Invisible.
Incidents
YOUR GOAL. OUR MISSION.

Mais conteúdo relacionado

Mais de Unisys Corporation

Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicUnisys Corporation
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“Unisys Corporation
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...Unisys Corporation
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...Unisys Corporation
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.Unisys Corporation
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Unisys Corporation
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security InfographicUnisys Corporation
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services InfographicUnisys Corporation
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure InfographicUnisys Corporation
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services InfographicUnisys Corporation
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Corporation
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation InfographicUnisys Corporation
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Corporation
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Corporation
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Corporation
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Corporation
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Corporation
 

Mais de Unisys Corporation (20)

Unisys Client 360
Unisys Client 360Unisys Client 360
Unisys Client 360
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey Infographic
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic
 
Digital Gen Infographic
Digital Gen InfographicDigital Gen Infographic
Digital Gen Infographic
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services Infographic
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation Infographic
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection Infographic
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: France
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: Spain
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: China
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Stealth for Water Treatment

  • 1. EXECUTIVE OVERVIEW Keep Water Supplies Safe from Cyber Threats DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
  • 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. To provide safe water for public use, water distribution and treatment utilities have heavily invested in automated systems to improve reliability, safety, and to meet ever-stricter regulatory demands. These modernized systems are increasingly dependent on Remote Telemetry Units (RTUs), Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition systems (SCADA). These systems are critical to not just the monitoring and efficient distribution of our water supply, but also are critical in areas such as water filtration and chlorine, ammonia, and fluoride dosing. But these components are in the cross-hairs of Advanced Persistent Threats (APT) and many other cyber-threats. Primary targets include: 1) ICS/SCADA and related RTUs. These systems make up nearly seven percent of the entire SCADA installed base.1 This amounts to hundreds of thousands of targeted water control units. As demand and greater water conservation and treatment technologies improve, water utilities will deploy even more ICS/SCADA/RTUs. 1 Frost & Sullivan, Strategic Analysis of the Global SCADA Market, March 2013 2) Command and control centers. These remote units and controls are routed through central command centers at most utilities. However, the communication to and from these field units is over a variety of mediums: radio, wireless, and Ethernet connections to the centers’ Human- Machine Interfaces (HMIs). How can water treatment facilities strengthen mission- critical security, reduce costs, and increase agility— all at the same time? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  • 3. Executive Overview3 STEALTH COMMUNITIES OF INTEREST Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security concerns by making ICS/ SCADA/RTU endpoints and the command and control center network invisible to unauthorized users and by securing data-in-motion across any network. This is how Stealth can help water utilities Get to Zero Incidents. By creating highly-trusted Communities of Interest (COI), Stealth is designed to allow only authorized users to access devices, applications, or systems critical to water supplies and water treatment facilities. In addition to strengthening mission- critical protection, water treatment utilities can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility utilities need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that water utilities need to help maintain reliability, safety, and security: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make RTU and ICS/SCADA endpoints invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Protect data-in-motion with high-level encryption. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect the water utility enterprise, including customer data, accounting, and distribution and treatment with one cost-effective security solution. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. You Can’t Hack What You Can’t See NETWORK COMMAND & CONTROL CENTER TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. x
  • 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Contact us: stealth@unisys.com Don’t Be a Target. Go Invisible. Incidents YOUR GOAL. OUR MISSION.