SlideShare a Scribd company logo
1 of 4
Download to read offline
EXECUTIVE OVERVIEW
Cyber Threats
Challenging Your Reliability?
UNISYS STEALTH KEEPS THE LIGHTS ON AND TARGETS DARK
Executive Overview2
Zero Incidents:
Your Goal. Our Mission.
Because of the “always available” requirement and the
catastrophic implications when service is disrupted,
electric power organizations are rich targets for
hackers seeking to disrupt critical operations and
exfiltrate sensitive data. Power generation and
distribution systems are increasingly vulnerable to
cyber-attack.
An advanced persistent threat (APT) by cyber-terrorists
or the introduction of viruses and worms could bring
down portions of power grids. The three weakest
links subject to cyber threats on the power grid are:
1) Industrial Control System (ICS) and Supervisory
Control and Data Acquisition (SCADA) systems.
Legacy technologies, combined with traditional
perimeter defenses and air gap approaches are
vulnerable to risk from APTs and other sophisticated,
coordinated threats.
2) Command and control centers. The operating
systems that the human-machine interface (HMI)
applications rely on to communicate with ICS/
SCADA equipment are ripe targets for hackers and
malicious code.
3) Smart grid components. In addition to multiplying
risks, these devices will generate huge amounts
of data required for existing and pending energy
regulations and audits.
How can electric power organizations strengthen
mission-critical mission-critical security, reduce
costs, and improve agility—all at the same time?
With Unisys Stealth™, you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
point-to-point encryption.
Consolidate. Reduce reliance on physical
IT infrastructure.
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
Keep Critical Infrastructure Secure
Executive Overview3
Stop Cyber Assaults
Before They Happen
Unisys Stealth takes a radically different approach to
addressing security concerns by making ICS/SCADA
endpoints connected to the network command and
control centers invisible to unauthorized users and
by securing data-in-motion across any network. This
is how Stealth can help electric power organizations
Get to Zero Incidents.
By creating highly-trusted communities of interest
(COI), Stealth is designed to allow only authorized
users to access devices, applications, and systems
critical to the safe operation of electric power
providers, from power generation to customer
distribution. In addition to strengthening mission-
critical protection, electric power organizations can
reduce infrastructure costs by safely modernizing
their industrial controls and software with one unified
security solution. And as regulatory mandates change,
Stealth can deliver the agility enterprises need without
requiring costly upgrades or extensive reconfiguration.
Why Stealth Now?
Unisys Stealth is the innovative, mission-critical
security that electric power utilities need to
maintain reliability:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation so you can upgrade
your systems without compromising security.
Reduces risk. Make endpoints invisible. Isolate critical
systems from the rest of the enterprise. Tighten access
control based on user identity.
Facilitates compliance. Stealth can help achieve
compliance with NERC CIP, the Executive Order on
Improving Critical Infrastructure Cybersecurity, and
other regulatory requirements and recommendations.
Reduces costs. Protect enterprise customer data,
accounting, distribution, and ICS/SCADA with one
cost-effective security solution—Stealth can cover
both business and power and distribution processes.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving regulatory
requirements or mission/business needs.
STEALTH COMMUNITIES OF INTEREST
You Can’t Hack What You Can’t See
NETWORK COMMAND
& CONTROL CENTER
Go Invisible.
You control who can
access—or even see—
SCADA/ICS, command
and control centers, and
smart grid components.
TRUSTED
USER
(COI)
TRUSTED
USER
(COI)
UNAUTHORIZED
USER
x
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo
are registered trademarks or trademarks of Unisys Corporation. All other brands and products
referenced herein are acknowledged to be trademarks or registered trademarks of their
respective holders.
Stealth is What
Innovative Security
Looks Like
When it comes to critical infrastructure, there
can be no compromise. Stealth can help move
your organization from vulnerable to mission-
critically secure. But don’t take our word for it.
Read Network World’s May 2014 independent
review of Stealth and see why Stealth might
just be “a great way to hide from hackers.”
www.unisys.com/gettozero
Keep the Lights On and Targets Dark
Contact us:
Eastern Region:
Paul Armstrong, 310-944-0833
paul.armstrong@unisys.com
Central Region:
Steve Walston, 972.629.4270
steve.walston@unisys.com
Western Region:
Loren Barnett, 303.518.5102
loren.barnett@unisys.com
Federal:
Sandy Holland, 703.447.4490
sandra.holland@unisys.com
TOLA:
Kim Henry, 469.939.0889
Kimberly.henry@unisys.com
Business Development:
Karen Walsh, 304.579.0391
karen.walsh@unisys.com
Lari Young, 703.507.3401
lari.young@unisys.com
Canada:
Beverly Golchuk, 416.770.0662
beverly.golchuk@unisys.com
UK:
Simon Totterdell, +44 787.299.4090
simon.totterdell@unisys.com
www.unisys.com/stealth

More Related Content

Recently uploaded

BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarhhamitthakurdma01
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Discover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleDiscover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleMy Heart Throw Pillow
 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxelizabethella096
 
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756dollysharma2066
 
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift AdvertisingElevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift AdvertisingVikasYadav194549
 
Martal Group - B2B Lead Gen Agency - Onboarding Overview
Martal Group - B2B Lead Gen Agency - Onboarding OverviewMartal Group - B2B Lead Gen Agency - Onboarding Overview
Martal Group - B2B Lead Gen Agency - Onboarding OverviewMartal Group
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationtbatkhuu1
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15SearchNorwich
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCall girl Jaipur
 
Enhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San FranciscoEnhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San Franciscosanfranciscoprfirms
 
The+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfThe+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfSocial Samosa
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdftbatkhuu1
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxelizabethella096
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxelizabethella096
 
Analysis of Sineing Website and how to fix
Analysis of Sineing Website and how to fixAnalysis of Sineing Website and how to fix
Analysis of Sineing Website and how to fixDHARMENDER PRATAP
 

Recently uploaded (20)

BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 39 Noida Escorts Escorts >༒8448380779 Escort Service
 
Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarh
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Discover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleDiscover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your Lifestyle
 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptx
 
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
 
Buy Linkedin Sales Navigator at Cheap Price
Buy Linkedin Sales Navigator at Cheap PriceBuy Linkedin Sales Navigator at Cheap Price
Buy Linkedin Sales Navigator at Cheap Price
 
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu.Ka.Tilla Delhi Contact Us 8377877756
 
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift AdvertisingElevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
Elevate Your Advertising Game: Introducing Billion Broadcaster Lift Advertising
 
Martal Group - B2B Lead Gen Agency - Onboarding Overview
Martal Group - B2B Lead Gen Agency - Onboarding OverviewMartal Group - B2B Lead Gen Agency - Onboarding Overview
Martal Group - B2B Lead Gen Agency - Onboarding Overview
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girl
 
Enhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San FranciscoEnhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San Francisco
 
The+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfThe+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdf
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
Analysis of Sineing Website and how to fix
Analysis of Sineing Website and how to fixAnalysis of Sineing Website and how to fix
Analysis of Sineing Website and how to fix
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Get to zero stealth electric power generation_executive_overview_ch

  • 1. EXECUTIVE OVERVIEW Cyber Threats Challenging Your Reliability? UNISYS STEALTH KEEPS THE LIGHTS ON AND TARGETS DARK
  • 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. Because of the “always available” requirement and the catastrophic implications when service is disrupted, electric power organizations are rich targets for hackers seeking to disrupt critical operations and exfiltrate sensitive data. Power generation and distribution systems are increasingly vulnerable to cyber-attack. An advanced persistent threat (APT) by cyber-terrorists or the introduction of viruses and worms could bring down portions of power grids. The three weakest links subject to cyber threats on the power grid are: 1) Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Legacy technologies, combined with traditional perimeter defenses and air gap approaches are vulnerable to risk from APTs and other sophisticated, coordinated threats. 2) Command and control centers. The operating systems that the human-machine interface (HMI) applications rely on to communicate with ICS/ SCADA equipment are ripe targets for hackers and malicious code. 3) Smart grid components. In addition to multiplying risks, these devices will generate huge amounts of data required for existing and pending energy regulations and audits. How can electric power organizations strengthen mission-critical mission-critical security, reduce costs, and improve agility—all at the same time? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. Keep Critical Infrastructure Secure
  • 3. Executive Overview3 Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security concerns by making ICS/SCADA endpoints connected to the network command and control centers invisible to unauthorized users and by securing data-in-motion across any network. This is how Stealth can help electric power organizations Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized users to access devices, applications, and systems critical to the safe operation of electric power providers, from power generation to customer distribution. In addition to strengthening mission- critical protection, electric power organizations can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that electric power utilities need to maintain reliability: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make endpoints invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Facilitates compliance. Stealth can help achieve compliance with NERC CIP, the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect enterprise customer data, accounting, distribution, and ICS/SCADA with one cost-effective security solution—Stealth can cover both business and power and distribution processes. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. STEALTH COMMUNITIES OF INTEREST You Can’t Hack What You Can’t See NETWORK COMMAND & CONTROL CENTER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control centers, and smart grid components. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  • 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Keep the Lights On and Targets Dark Contact us: Eastern Region: Paul Armstrong, 310-944-0833 paul.armstrong@unisys.com Central Region: Steve Walston, 972.629.4270 steve.walston@unisys.com Western Region: Loren Barnett, 303.518.5102 loren.barnett@unisys.com Federal: Sandy Holland, 703.447.4490 sandra.holland@unisys.com TOLA: Kim Henry, 469.939.0889 Kimberly.henry@unisys.com Business Development: Karen Walsh, 304.579.0391 karen.walsh@unisys.com Lari Young, 703.507.3401 lari.young@unisys.com Canada: Beverly Golchuk, 416.770.0662 beverly.golchuk@unisys.com UK: Simon Totterdell, +44 787.299.4090 simon.totterdell@unisys.com www.unisys.com/stealth