SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
EXECUTIVE OVERVIEW
Advance Safety and
Cybersecurity
DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
Executive Overview2
Zero Incidents:
Your Goal. Our Mission.
To remain competitive, deliver the best products to
the market securely, and meet increased regulatory
requirements, the chemical processing industry must
modernize. Unfortunately, these goals are often at
odds with one another. Innovation and competitive-
ness rely on new technology that integrates business
processes (real-time analytics, enterprise resource
planning, supply chain automation) with production.
But the introduction of the latest supervisory control
and data acquisition (SCADA) systems, industrial
control systems (ICS), and programmable logic
controllers (PLCs) and their related human-machine
interface (HMI) and machine-to-machine (M2M)
software puts chemical companies at significant
risk for cyber-attacks.
According to a recent report in Reuters (March 2014),
at least 48 chemical and defense plants were
attacked with a virus called ‘Nitro.’ Sources report
the virus originated in China, and the targets were
vulnerable to data theft, such as formulas and pro-
cessing techniques. Such viruses can also disrupt
operations and bring down entire network systems.1
1
	Finkle, Jim. ‘Nitro’ Attacks: China-Based Hacker Targeted Chemical Firms.
Reuters, March 26, 2014. http://www.huffingtonpost.com/2011/10/31/
nitro-attacks-china-hacker-chemical-firms-symantec_n_1067978.html
How can chemical companies protect their facilities
against advanced persistent threats (APT) and other
sophisticated cyber-attacks while also reducing
costs and improving agility? With Unisys Stealth™,
you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
point-to-point encryption.
Consolidate. Reduce reliance on physical
IT infrastructure.
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
Keep Critical Infrastructure Secure
Executive Overview3
Stop Cyber Assaults
Before They Happen
Unisys Stealth takes a radically different approach
to addressing the most critical security concerns.
Stealth is designed to make SCADA/ICS and PLC
endpoints at chemical processing plants on the
command and control network invisible to unauthor-
ized users and to secure data-in-motion across any
network. This is how Stealth can help chemical
companies Get to Zero Incidents.
By creating highly-trusted communities of interest
(COI), Stealth is designed to allow only authorized
users to access automated devices, applications,
and systems critical to the chemical processing
facility. In addition to strengthening mission-critical
protection, chemical companies can reduce
infrastructure costs by safely modernizing their
industrial controls and software with one unified
security solution. And as business requirements or
regulatory mandates change, Stealth can deliver
the agility enterprises need without requiring costly
upgrades or extensive reconfiguration.
Why Stealth Now?
Unisys Stealth is the innovative, mission-critical
security that chemical companies need to help
secure their operations:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation so you can upgrade
your systems without compromising security.
Reduces risk. Make automated chemical processing
controls such as ICS/SCADA endpoints and HMI
systems invisible. Isolate critical systems from the
rest of the enterprise. Tighten access control based
on user identity. Make mobile and wireless
applications more secure. Protect data-in-motion
over the industrial control network.
Facilitates compliance. Stealth can help achieve
compliance with the Executive Order on Improving
Critical Infrastructure Cybersecurity, and other
regulatory requirements and recommendations.
Reduces costs. Protect the chemical processing
enterprise system, including sensitive financial,
production processes, formulas, and network data
with one cost-effective solution.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving
business needs.
You Can’t Hack What You Can’t See
STEALTH COMMUNITIES OF INTEREST
NETWORK COMMAND
& CONTROL CENTER
Go Invisible.
You control who can
access—or even see—
SCADA/ICS, command
and control systems, and
other endpoints.
TRUSTED
USER
(COI)
TRUSTED
USER
(COI)
UNAUTHORIZED
USER
x
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo
are registered trademarks or trademarks of Unisys Corporation. All other brands and products
referenced herein are acknowledged to be trademarks or registered trademarks of their
respective holders.
Stealth is What
Innovative Security
Looks Like
When it comes to critical infrastructure, there
can be no compromise. Stealth can help move
your organization from vulnerable to mission-
critically secure. But don’t take our word for it.
Read Network World’s May 2014 independent
review of Stealth and see why Stealth might
just be “a great way to hide from hackers.”
www.unisys.com/gettozero
Contact us:
Eastern Region:
Paul Armstrong, 310-944-0833
paul.armstrong@unisys.com
Central Region:
Steve Walston, 972.629.4270
steve.walston@unisys.com
Western Region:
Loren Barnett, 303.518.5102
loren.barnett@unisys.com
Federal:
Sandy Holland, 703.447.4490
sandra.holland@unisys.com
TOLA:
Kim Henry, 469.939.0889
Kimberly.henry@unisys.com
Business Development:
Karen Walsh, 304.579.0391
karen.walsh@unisys.com
Lari Young, 703.507.3401
lari.young@unisys.com
Canada:
Beverly Golchuk, 416.770.0662
beverly.golchuk@unisys.com
UK:
Simon Totterdell, +44 787.299.4090
simon.totterdell@unisys.com
www.unisys.com/stealth
Don’t Be a Target. Go Invisible.

Contenu connexe

En vedette (13)

Índice de masa corporal
Índice de masa corporal Índice de masa corporal
Índice de masa corporal
 
Conceptualización Onto-Epistemíca.
Conceptualización Onto-Epistemíca.Conceptualización Onto-Epistemíca.
Conceptualización Onto-Epistemíca.
 
KAU transcript
KAU transcript KAU transcript
KAU transcript
 
Cómo encontrar la pareja ideal
Cómo encontrar la pareja idealCómo encontrar la pareja ideal
Cómo encontrar la pareja ideal
 
Los Elementos Quimicos En Nuestro Cuerpo
Los Elementos Quimicos En Nuestro CuerpoLos Elementos Quimicos En Nuestro Cuerpo
Los Elementos Quimicos En Nuestro Cuerpo
 
El Envidioso
El EnvidiosoEl Envidioso
El Envidioso
 
El mar
El marEl mar
El mar
 
Pareja comunicacion
Pareja comunicacionPareja comunicacion
Pareja comunicacion
 
Epigenetica: mas alla de los genes
Epigenetica: mas alla de los genesEpigenetica: mas alla de los genes
Epigenetica: mas alla de los genes
 
El perdon 02 (matrimonios)
El perdon 02 (matrimonios)El perdon 02 (matrimonios)
El perdon 02 (matrimonios)
 
La mujer en la especie humana
La mujer en la especie humanaLa mujer en la especie humana
La mujer en la especie humana
 
Emociones
EmocionesEmociones
Emociones
 
Elementos químicos
Elementos químicosElementos químicos
Elementos químicos
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Get to zero stealth chemical processing_executive_overview_ch

  • 1. EXECUTIVE OVERVIEW Advance Safety and Cybersecurity DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
  • 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. To remain competitive, deliver the best products to the market securely, and meet increased regulatory requirements, the chemical processing industry must modernize. Unfortunately, these goals are often at odds with one another. Innovation and competitive- ness rely on new technology that integrates business processes (real-time analytics, enterprise resource planning, supply chain automation) with production. But the introduction of the latest supervisory control and data acquisition (SCADA) systems, industrial control systems (ICS), and programmable logic controllers (PLCs) and their related human-machine interface (HMI) and machine-to-machine (M2M) software puts chemical companies at significant risk for cyber-attacks. According to a recent report in Reuters (March 2014), at least 48 chemical and defense plants were attacked with a virus called ‘Nitro.’ Sources report the virus originated in China, and the targets were vulnerable to data theft, such as formulas and pro- cessing techniques. Such viruses can also disrupt operations and bring down entire network systems.1 1 Finkle, Jim. ‘Nitro’ Attacks: China-Based Hacker Targeted Chemical Firms. Reuters, March 26, 2014. http://www.huffingtonpost.com/2011/10/31/ nitro-attacks-china-hacker-chemical-firms-symantec_n_1067978.html How can chemical companies protect their facilities against advanced persistent threats (APT) and other sophisticated cyber-attacks while also reducing costs and improving agility? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  • 3. Executive Overview3 Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing the most critical security concerns. Stealth is designed to make SCADA/ICS and PLC endpoints at chemical processing plants on the command and control network invisible to unauthor- ized users and to secure data-in-motion across any network. This is how Stealth can help chemical companies Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized users to access automated devices, applications, and systems critical to the chemical processing facility. In addition to strengthening mission-critical protection, chemical companies can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as business requirements or regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that chemical companies need to help secure their operations: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make automated chemical processing controls such as ICS/SCADA endpoints and HMI systems invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Make mobile and wireless applications more secure. Protect data-in-motion over the industrial control network. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect the chemical processing enterprise system, including sensitive financial, production processes, formulas, and network data with one cost-effective solution. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving business needs. You Can’t Hack What You Can’t See STEALTH COMMUNITIES OF INTEREST NETWORK COMMAND & CONTROL CENTER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  • 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Contact us: Eastern Region: Paul Armstrong, 310-944-0833 paul.armstrong@unisys.com Central Region: Steve Walston, 972.629.4270 steve.walston@unisys.com Western Region: Loren Barnett, 303.518.5102 loren.barnett@unisys.com Federal: Sandy Holland, 703.447.4490 sandra.holland@unisys.com TOLA: Kim Henry, 469.939.0889 Kimberly.henry@unisys.com Business Development: Karen Walsh, 304.579.0391 karen.walsh@unisys.com Lari Young, 703.507.3401 lari.young@unisys.com Canada: Beverly Golchuk, 416.770.0662 beverly.golchuk@unisys.com UK: Simon Totterdell, +44 787.299.4090 simon.totterdell@unisys.com www.unisys.com/stealth Don’t Be a Target. Go Invisible.