+ All Categories
Home > Documents > YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA &...

YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA &...

Date post: 21-May-2020
Category:
Upload: others
View: 8 times
Download: 0 times
Share this document with a friend
8
YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you end-to-end protection www.star-controls.com [email protected] 954.603.0491
Transcript
Page 1: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER

WE DELIVER SCADA CYBER SECURITY SOLUTIONSoffering you end-to-end protection

www.star-controls.com [email protected] 954.603.0491

Page 2: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

• LackofNetworkSegmentation

• LackofEncryption

• Ransomware

• RemoteAccessPolicies

• DDoSAttacks

• Malware

• LegacySoftware

• DefaultConfiguration

• PoliciesandProcedures

• CommandInjectionandParameters

Manipulationdamage.

THREATS & VULNERABILITIES

With numerous threats and vulnerabilities that could affect critical services, securing SCADA systems must be a top priority.

AttacksonSCADAsystemsareontherise.Thefrighteningtruthisthatmanyinfiltratedsystemshavegoneundetected.

Alltoooften,cybercriminals“infect”systemsandsilentlymonitortraffic,observeactivity,andwaitformonthsoreven

yearsbeforetakinganyactionallowingthemtostrikewhentheycancausethemostdamage.

Page 3: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

IN THE PAST FEW YEARS WE HAVE SEEN:

• July2017-“Weneveranticipatedthatourcriticalinfrastructurecontrolsystemswouldbefacingadvanced

levelsofmalware,”Mr.Wellinghoffsaid.“HackersAreTargetingNuclearPlants,U.S.Says”New York Times

• June2017-Greenberg,aseniorreporteratWired,reportsthatmanycybersecurityexpertsbelieveRussiais

usingUkraineasacyber-wartestingground.

• December2016-Incidentoccurredamidaflurryof6,500cyberattacksovertwomonths,accordingto

Ukraine’sPresidentPetroPoroshenko.PoroshenkosaidtheattacksindicatedRussian“cyberwar.”

• September2016-LargestDDoSattackeverdeliveredbybotnetofhijackedIoTdevices,accordingto

NetworkWorld.

• October2015-ChathamHouse,aUKthink-tank,reportedthattheriskofacyberattackonnuclear

infrastructureisgrowing.ThetrendtowardsthedigitizationofSCADAsystemsisincreasingthevulnerability

ofnuclearfacilities,andmanyareinadequatelyprepared.Evenwherefacilitiesareair-gapped,thissafeguard

canbebreachedwithnothingmorethanaflashdrive.

• April2015-Accordingtothe2015DellSecurityAnnualThreatReport,SCADAattacksareontherise.The

reportfoundthatin2014,thenumberofattacksonSCADAsystemsdoubledcomparedtothepreviousyear.

MostoftheseattacksoccurredinFinland,theUnitedKingdom,andtheUnitedStates.

• March2015-AreportbytheUSIndustrialControlSystemsCyberEmergencyResponseTeam(ICS-CERT)found

thatitreceived245cyberincidentreportsfromassetownersandindustrypartnersinthefiscalyearof2014.

• December2014–AnunnamedGermanSteelMillsufferedextensivedamagefromacyber-attack.The

attackerswereabletodisruptthecontrolsystemandpreventablastfurnacefrombeingshutdown,resulting

in‘massive’damage.

GLOBAL ATTACKS

“We recognize the enemy will use the Internet to recruit, to take down SCADA systems. In short, we expect a cyberattack

as a prelude to war.” - LTG Alan Lynn, DISA (Defense Information Systems Agency) Director

Page 4: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

Star Controls has partnered with the top vendors to include best of breed products in the SCADA Cyber Security Field

Star Controls offers end-to-end, holistic approach, that integrate technologies, products and

protocols thatweredesignedfor the ICS/SCADAsecurity,and leverages technicalStarControls’

knowhow.

Atagranularlevel,allproductsandsolutionsthatStarControlsworkwithofferthehighestlevelof

securityateverycriticalstageofoperation.ThesolutionscoverstheOT(OperationalTechnology,

the traditional ICS/SCADA), aswell as the IT ( traditional IT security). Star Controls provides a

completeCyberSecuritysolutionfortheICS/SCADAsystems,whichdetectandprotectanypotential

entrypointintothesystem.It’sintegratedandholisticapproachstitchestheCyberSecurityforall

componentsthatarepartoftheSCADAsystem:

• DataCenter-SCADAServersandFrontEndProcessors(orGateways)

• Networks-Devices,suchasWirelessRadiosandGateways

• RemoteSites-RTUs/PLCsandSmartDevicesandSiteSecurity

Star Controls offers end-to-end, holistic approach, that integrate technologies, products and

protocols thatweredesignedfor the ICS/SCADAsecurity,and leverages technicalStarControls’

knowhow.

SCADA SOFTWAREForCyberSecurityStarControlsoffersdifferentSCADAsoftwareproducts,whiletheVTScadais

amongthebestfitforCyberSecurity.

VTSCADA SCADA SOFTWARE

Eachapplicationincludesitsownsecurityaccountsandsettingswhichcontrolaccesstoallpartsof

theapplicationincludingworkstations,thinclients,mobileclients,andalarmnotifications.Deployed

securitychangesareimmediateandapplicationwide.Accountsareeasilycopied,modified,and

deleted.Youcannowevenshareaccountsacrossmultipleapplications.

• Military-gradeencryption

• Securityprotocols

• Passwordprotection

• Groupmanagement

• Sharesecurityaccountsapplications

FIREWALLS FOR ICS/SCADAStar Controls includes products from Check Point, the industry leader in IT Security, to provide a complete To-Down IT Security to the ICS/SCADA systems.

Page 5: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

CHECK POINT GATEWAY AND ANALYTIC MANAGERCheckPointoffersthemostadvancedcybersecurity.AligningOperationalTechnology(OT)withInformation Technology (IT) security, Check Point provides an end-to-end multi-layer threatdefense,allowingreal-timeprotectionandmonitoringagainstthreatswithfullvisibilityalongwithgranularcontrolofSCADAtraffic.Pairedwithruggedizedapplianceoptionsandcomprehensiveprotocol support,CheckPointensures critical assetsarenever compromised.Withourbest inclassmanagementplatformallITandOTenvironmentsaresupportedwithasingle,unifiedandrobustmanagement;themostadvancedexistingtoday.

CheckPoint’sSandBlastisacompletesolutionforITsecurity,includingFirewall,Anti-Malware,Anti-Bot,Anti-Ransomware,Forensicsandmore.ThefollowinginformationontheSandBlastZeroDayProtectionandAnti-Ransomwareincludesmoredetailsonitscapabilitiesintheseareas.

SANDBLAST ZERO DAY PROTECTIONS All enterprises are at risk of targeted attacks such as spear phishing and Advanced PersistentThreats.CheckPointSandBlastZero-DayProtection,with itsuniqueexploit-leveldetectionandthreat extraction, provides an additional layer of security from even the most sophisticatedhackersanddangerousattacks.Unliketraditionalsandboxingsolutionsthataresubjecttoevasiontechniquesandeitherintroduceunacceptabledelaysorletpotentialthreatsthroughwhileunderevaluation,CheckPointcatchesmoremalware,withminimalimpactondeliverytimes.SandBlastisofferedattheNetworklevel,intheCloud,andattheEndPoint.

ANTI-RANSOMWARECheckPointSandBlastAgentwithAnti-Ransomwareandzerophishingtechnology,extendszero-day protections to web-browsers and end-user devices to defend against advanced attacks,keeping users safe nomatter where they go.With continuous data collection and automatedincidentanalysis,SandBlastAgentprovidesactionableforensics,whichacceleratestheprocessofunderstandingthecompleteattacklifecycle,damage&attackvectors,tomaximizeresponseteamproductivityandminimizeresolutiontimes.Anti-Ransomwarekeepsbusinessesonestepaheadofattacksbyautomaticallydetecting,blockingandremovingthemostsophisticatedransomwareinfectionsandrestoringanyencrypteddataaspartofitsautomatedremediationcapability.

WIRELESS GATEWAYS StarControlsoffersavarietyofwirelessGateways,suchascellmodemsordataradios,forprivateandpublicnetworks.StarControlsengineerswilladdallnecessaryauthenticationandencryptiontotheunits,sosecurethissegmentoftheSCADAsystem.

PRIVATE NETWORKS StarControlsoffersproductsfromleadingvendors,suchasCalAmp,4RFandGE-MDS.

PUBLIC NETWORK Star Controls offers products from leading vendors such as SierraWireless and Red-Lion.OurIT security experts will facilitate the dialogue with the cellular service provider, to define andimplementallnecessaryITsecurity,e.g.VPN,whilethedataisgoingthroughtheSP’snetworks.

TheAirLinkRavenRV50fromSierraWirelessisanexampleforCellularGatewaythatmeetstheOTandITrequirements.TheRavenRV50is loadedwithfeaturestosecurecriticaldata.Itsupportssecure communications tomultiple back-end systems by providing up to five concurrent VPNsessions.Remoteauthenticationmanagementallowsenterprise-gradesystemstomanageaccess

Page 6: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

RTU, PLCS AND SMART DEVICES This area in the system is vulnerable and has been

ignored by almost all vendors. Star Controls is

addressing existing systems by adding layer of IT

SecuritytositeswithPLCsandSmartDevicesthatare

usedby thedifferent verticalmarket. StarControls is

alsopromotingtheMotorolaACE3600RTU,whichisthe

firstRTUintheindustrythatprovidesacompleteend-

to-endITSecuritytotheremotemonitorandcontrols.

SECURED ACE3600

Secured ACE3600 RTUs, FEP (ACE IP Gateway or

ACE3600 FIU) with enabled security features such as

access/interface control, secured communication,

secured files, and security-related logs. ACE3600

Security Policy is a set of configurable system-wide

security parameters for enforcing the organization’s

security policy in the ACE3600 system management

tools(STS),front-endunitsandfieldunits.

ACE SECURED SYSTEM – SECURITY LAYERS

• SecureAccessControl

–Useraccesscontroltoallsystemparts

–Rolesandpermissions

–M2Maccesscontrol

–Centralaccessmanagement&control

• Audit

–Integratedsecuritylog

–Loggingsecurityevents

–Sendingsecurityalerts

• StoredDataEncryption

–Fileencryption

• CommunicationsSecurity

–Datapayloadencryption

–Encryptionkeymanagement

–IntegratedIPFirewall

–Unusedportdisabling

–Suppressingvulnerableprotocols

–MessageLifeTime

• Whitelisting

–Run-filewhitelistingintheRTUs

–Management tools white listing & configuration

changecontrol

• Securedprogramming

–Implementingsecuredprogrammingmethodology

–Avoiding“backdoors”

–Usingprotocols/portscanners

–.NETCodeobfuscation

STARTU SOFTWARE APPLICATION

Star Controls’ flagship software product, for the

Motorola RTUs, is a game changer in the RTU/PLC

market, providing the SCADA and the O&M team

unparalleledcapabilitiesandeaseofusetoconfigure,

change and maintain every aspect of the RTU. The

StaRTUhasbeenupgraded toworkon theMotorola

Secured ACE600 RTU. Star Controls is also planning

to incorporate logs from the StaRTU loggers (i.e.

Communications and I/Os) into the Cyber Security

AnalyticatCheckPointManager.Thiswillcovernon-IP,

legacy,SCADAsystems.

SITE SECURITY The site security is an important part of the overall

securityof the ICS/SCADA system. The integrationof

thetwosystemsallowsthecorrelationbetweenalerts

fromITsecuritywiththesitesecurity.Thesitesecurity

includes access management and advanced video

surveillance,includingvideoanalytics.

Page 7: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

CYBER-SECURED SCADA SYSTEM

CONCEPTUAL BLOCK DIAGRAMwith Cyber Security Solution Partners

DATA CENTER

WIRELESS COMMUNICATION

DEVICE

MOTOROLARTU

FIREWALL

SCADA REMOTE SITE

SCADAREMOTE

SITE

FIUs

INTERNET

SCADAREMOTE

SITE

SCADAREMOTE

SITE

SCADAREMOTE

SITE

SCADAREMOTE

SITESCADA

REMOTESITE

WIRELESSNETWORK

SMS/EMAIL

LANCHECK POINT GATEWAY & ICS ANALYTICS

Page 8: YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER · 2017-10-09 · YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER WE DELIVER SCADA CYBER SECURITY SOLUTIONS offering you

YOUR GLOBAL IIOT, SCADA & TELECOMMUNICATIONS PARTNER

star-controls.com

[email protected]

+1-954-603-0491

11555HeronBayBlvd,Suite#200CoralSprings,FL33076


Recommended