4
EXECUTIVE OVERVIEW Stop Cyber Attacks and Espionage DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.

Get to zero stealth oil gas prod_executive_overview_ch

Embed Size (px)

Citation preview

EXECUTIVE OVERVIEW

Stop Cyber Attacks and Espionage

DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.

Executive Overview2

Zero Incidents: Your Goal. Our Mission.Cybercrime is changing the way oil and natural gas

executives look at securing their facilities and

intellectual property. The fact that a virus infected

30,000 computers at one of the world’s largest oil

producers in Saudi Arabia, disrupted operations for

several days,1 and gathered data from the company’s

SCADA systems2 is simply unacceptable. Remote oil

rigs, especially those at sea, depend on SCADA and

wireless and satellite communications to control

key aspects of drilling and extraction. According to a

report in Pipeline and Gas Journal, “…the introduction

of information technologies and connectivity through

systems and protocols such as Windows, Ethernet,

TCP/IP and wireless technologies within industrial

control devices has resulted in significantly less

isolation from the outside world.”3 In fact, according

to a report in Network World, “engineers took remote

control of the programmable logic controller (PLC)

1 Shankland, Stephen. Data theft attacks besiege oil industry, McAfee says. CNET NEWS, February 12, 2011.

2 Kube, Nate. Cyber Security and SCADA in Critical Infrastructure. Oil and Gas Journal, February 2013. http://pipelineandgasjournal.com/cyber-security-and-scada-critical-infrastructure

3 Not cyber myths: Hacking oil rigs, water plants, industrial infrastructure. Network World, August 5, 2013. http://www.networkworld.com/community/blog/not-cyber-myths-hacking-oil-rigs-water-plants-industrial-infrastructure

on a simulation oil rig, turned the pumps on and off

so it sprayed liquid—which would have been an oil

pipeline rupture in real life—while sending data

that made it appear as if nothing happened.”

How can oil and gas companies protect their operations

and intellectual property against the tidal wave of

advanced persistent threats (APT) and keep ahead

of increasingly sophisticated cyber attacks? With

Unisys Stealth™, you can:

Go invisible. Make servers, devices, and other

endpoints dark and undetectable to hackers and

unauthorized users inside and outside your enterprise.

Isolate segments of your data center based

on user identity. Define and control access to

mission-critical systems and information based

on need-to-know access.

Secure data-in-motion. Protect data with

point-to-point encryption.

Consolidate. Reduce reliance on physical

IT infrastructure.

Scale and adapt. Upgrade legacy systems, easily

meet emerging needs and compliance requirements

with agile, software-based security.

Keep Critical Infrastructure Secure

Executive Overview3

Stop Cyber Assaults Before They HappenUnisys Stealth takes a radically different approach

to addressing security concerns by making endpoints

such as ICS/SCADA and PLCs at remote production,

well-head, and refinery operations on the command

and control network invisible to unauthorized users

and by securing data-in-motion across any network.

This is how Stealth can help oil and gas production

companies Get to Zero Incidents.

By creating highly-trusted communities of interest

(COI), Stealth is designed to allow only authorized

users to access devices, applications, and systems

critical to the oil and gas production process. In

addition to strengthening mission-critical protection,

oil and gas organizations can reduce infrastructure

costs by safely modernizing their industrial controls

and software with one unified security solution. And

as regulatory mandates change, Stealth can deliver

the agility enterprises need without requiring costly

upgrades or extensive reconfiguration.

Why Stealth Now?Unisys Stealth is the innovative, mission-critical

security that oil and gas production companies need to

help secure their intellectual property and operations:

No operational disruption. Stealth works with existing

firewall, intrusion detection, and other security

systems with easy installation so you can upgrade

your systems without compromising security.

Reduces risk. Make pipeline, rig, well-head,

refinery, and ICS/SCADA systems invisible. Isolate

critical systems from the rest of the enterprise.

Tighten access control based on user identity. Shield

mobile applications and control from attack with

high-level encryption.

Facilitates compliance. Stealth can help achieve

compliance with the Executive Order on Improving

Critical Infrastructure Cybersecurity, and other

regulatory requirements and recommendations.

Reduces costs. Protect the oil and gas production

system, including sensitive financial, production, and

exploration data with one cost-effective solution.

Improves agility. Stealth allows for quick, easy

changes to accommodate rapidly evolving regulatory

requirements or mission/business needs.

You Can’t Hack What You Can’t See

STEALTH COMMUNITIES OF INTEREST

NETWORK COMMAND & CONTROL CENTER

Go Invisible. You control who can access—or even see—SCADA/ICS, command and control systems, and other endpoints.

TRUSTED USER (COI)

TRUSTED USER (COI)

UNAUTHORIZED USER

x

© 2014 Unisys Corporation. All rights reserved.

Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.

Stealth is What Innovative Security Looks LikeWhen it comes to critical infrastructure, there

can be no compromise. Stealth can help move

your organization from vulnerable to mission-

critically secure. But don’t take our word for it.

Read Network World’s May 2014 independent

review of Stealth and see why Stealth might

just be “a great way to hide from hackers.”

www.unisys.com/gettozero

Don’t Be a Target. Go Invisible.

Contact us:

Eastern Region:Paul Armstrong, [email protected]

Central Region:Steve Walston, [email protected]

Western Region:Loren Barnett, [email protected]

Federal:Sandy Holland, [email protected]

TOLA:Kim Henry, [email protected]

Business Development:Karen Walsh, [email protected]

Lari Young, [email protected]

Canada:Beverly Golchuk, [email protected]

UK:Simon Totterdell, +44 [email protected]/stealth