Welcome!

Cloud Security Authors: Liz McMillan, Elizabeth White, Pat Romanski, Zakia Bouachraoui, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

Industrial Defender Launches Fourth Generation Technology Suite to Enhance Defense-in-Depth(TM) Cyber Security Protection for Industrial Control and SCADA Systems

Expands Cyber Security Technology Offering to Improve Protection and Compliance Management of NERC CIP Critical Cyber Assets

FOXBOROUGH, MA -- (Marketwire) -- 05/13/09 --


NEWS FACTS

  • Industrial Defender, the global leader in Cyber Risk Protection(TM), today announces the availability of its Fourth Generation Technology Suite, offering the industry's most comprehensive cyber security solution for industrial control and SCADA systems. This latest version of the Industrial Defender technology suite includes major enhancements to all cyber security defense layers, offering the industry's first and only Defense-in-Depth(TM) cyber security protection solution for electric power generation, energy management control centers and transmission substations. The Fourth Generation Technology Suite also provides industry-leading cyber security protection for other critical infrastructure industries, including the oil and gas, water, transportation and chemical sectors.

  • With this release, North American electric providers now have a comprehensive security event management (SEM), secure authentication, access control and compliance management solution. Enhancements include a single repository for monitoring, collecting, aggregating, reporting and archiving data to assist bulk electricity asset owners and operators with meeting the approaching NERC CIP compliance deadlines.

  • Access Manager 4 is a secure remote access and authentication solution which provides centralized and decentralized access topologies, and is hardware and protocol agnostic for easy deployment. Access Manager is fully integrated into the Industrial Defender SEM console for consolidated reporting, centralized monitoring, management and access control. Key features include:

    • Secure access and authentication for electric power substations and remote sites;
    • Comprehensive AutoAudit(TM) reporting to support NERC CIP compliance requirements;
    • Centralized and decentralized support for user authorization and authentication; and,
    • Active Directory support for single point administration and group management.

  • SEM 4 enhances the ability of process control SCADA system users to collect, alert and analyze security log data to simplify compliance and quickly respond to high risk security events. Key features include:

    • Enhanced third-party device monitoring support, including Cisco firewalls and switches;
    • Support for GarrettCom routers and Bow Networks Crossbow IED servers; and,
    • Access Manager data sharing for consolidated reporting of all critical cyber asset data for NERC CIP auditing.

  • Compliance Manager provides data collection and archiving of auditable events and configuration settings from DCS, SCADA, HMI workstations, electronic security perimeter devices and other critical cyber assets. Key features include:

    • Enhanced audit reporting through automated interpretation of log events;
    • Built-in report templates for critical infrastructure compliance regulations including NERC CIP; and,
    • Ad-hoc reporting capabilities for custom report generation.

  • Additional features of the Fourth Generation Technology Suite include new Network Intrusion Detection Sensors (NIDS), Host Intrusion Detection System (HIDS) enhancements, Industrial Security Rules, IEC 60870-5-104 and ODVA Ethernet/IP(TM) (CIP) protocol support, as well as a new Guard 110 UTM/Firewall, which is used to establish Electronic Security Perimeter (ESP) protection.

  • The Obama administration has made some very positive movements in securing the nation's critical infrastructure. Recently introduced cyber security legislation by Congress, including the bills proposed by Senators John Rockefeller (D-W. Va.) and Olympia Snowe (R-Maine), the Critical Electric Infrastructure Protection Act proposed by Sen. Joseph Lieberman (I-Conn) and Rep. Bennie Thompson (D-Miss.), as well as the Bulk Power System Protection Act proposed by Edward Markey (D-Mass.) and Rep. Henry Waxman (D-Calif), all underscore the need for greater cyber security protection of the United States' critical infrastructure operating systems.

QUOTES

  • "Our customers and partners continue to voice the need for critical infrastructure cyber security solutions to secure their critical cyber assets, while also meeting stringent compliance regulations," said Brian M. Ahern, President and CEO, Industrial Defender. "The release of the Industrial Defender Fourth Generation Technology Suite demonstrates our aggressive technology investment strategy to provide industry-leading security and compliance solutions for critical infrastructures."

  • "There are fundamental changes occurring in the modernization of the United States critical infrastructure (e.g. utility, energy, chemical, transportation), and the key areas of reliability and security. There are similar changes under consideration in other parts of the world," noted Earl Perkins, Research Vice President, Gartner, Inc. "In the particular field of cyber security, there is significant momentum and growth in the market for solution providers, and Gartner believes these solutions will play a vital role in protecting critical infrastructure and ensuring the reliability needed by citizens and business alike."

MULTIMEDIA ELEMENTS
Brian Ahern headshot
NERC Strengthened Cyber Security Standards
April 7th NERC Letter from Mike Assante
Critical Electric Power Protection Act
Industrial Defender Company Logo
NERC Timeline for Compliance
Rockefeller-Snowe Cyber Security Legislation
Bulk Power System Protection Act

About Industrial Defender

Industrial Defender, Inc., the global leader in Cyber Risk Protection(TM), is the first company to offer a completely integrated Defense-in-Depth(TM) cyber security solution designed to protect the industrial control system and SCADA environment in a flexible and cost effective platform. This comprehensive Cyber Risk Protection(TM) lifecycle solution enables the efficient assessment, mitigation and management of cyber security risk within the critical infrastructure network domain. Industrial Defender is a privately held company with over 18 years of industrial control system and SCADA industry experience, and more than 7 years of industrial cyber security experience -- recognized by Frost and Sullivan's for the 2008 Company of the Year Award. Industrial Defender has completed more than 100 process control / SCADA cyber security assessments, more than 9,000 global technology deployments in securing critical infrastructure systems, more than 3,000 mission critical SCADA deployments and provides managed security services for 160 process control plants in 21 countries.

Add to Digg Bookmark with del.icio.us Add to Newsvine

PRESS CONTACTS:

Todd Nicholson
Industrial Defender
508-718-6705
Email Contact
www.industrialdefender.com

Meredith Robertson
SHIFT Communications
617-779-1830
Email Contact
www.shiftcomm.com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...