The Latest Cyberoam News
Product and Solution Information, Press Releases, Announcements
Cyberoam Brings Holistic Security For Connected Critical Infrastructure | |
Posted: Wed Dec 04, 2013 02:22:09 PM | |
With integrated threat protection, situational awareness and security controls for Industrial Control Systems (ICS) including SCADA. New Jersey -- December 4, 2013 -- Cyberoam, the leading global provider of network security appliances, today announced the availability of security for Industrial Control Systems (ICS) on its UTM and NGFW network security appliances. Until recently, organizations maintained their critical infrastructure and Operational Technology (OT) ecosystem as closed silos. Rapid integration with IT networks has turned these isolated silos into a close coupling of Internet, enterprise and critical infrastructure networks. This transition has exposed previously unnoticed inherent security vulnerabilities in Industrial Control Systems (ICS) such as SCADA and more. Cyberoam aims to bridge these inherent security gaps in ICS environments to support secure migration / integration with TCP/IP networks. Cyberoam's holistic approach - Bridging the security gap, protecting IT integration and enabling business continuity Having become a part of 'The Internet of Things', critical infrastructure is now exposed to cyber threats and network security risks that were until now seen only with business networks. This includes exploiting insecure and inadequate authentication, infiltration of malware to disrupt key processes by targeting vulnerabilities in weak communication protocols, intercepting weak remote communication, exploitation of ICS component vulnerabilities and other web-based vulnerabilities primarily affecting HMIs. "Findings by ICS-CERT and other security studies reveal that cyber attackers are aggressively leveraging tools and databases like SHODAN search engine and The Internet Census to identify Internet-exposed critical infrastructure devices. As per an estimate over half a million ICS devices with poor or no authentication are exposed over the Internet. Integration of ICS and IT networks indeed augurs well for organizational productivity but unfortunately it has occurred at the cost of security," says Abhilash Sonwane, Senior VP, Product Management, Cyberoam. "Cyberoam aims to bridge this gap with a security approach that enables businesses harness IT integration without compromising the security of their critical infrastructure and ICS such as SCADA". Today's security administrator of connected critical infrastructure needs reliable authentication mechanism, enhanced visibility into network communication and user activities in ICS environments. By adding layer-8 and layer-7 capabilities, logging & reporting and IPS defense on top of ICS networks, Cyberoam gives required visibility and control enabling actionable security intelligence to protect critical infrastructure. Key security offerings available on Cyberoam security appliances for Industrial Control Systems include:
The future of smart-grid vision and successful evolution of intelligent networks depends on how best critical infrastructure networks are guarded and protected. However, a plethora of well-planned attacks such as Stuxnet, either born of corporate espionage, Hacktivism against rival economies or other ill motives continues to storm into ICS systems and SCADA networks at world's leading critical infrastructure sites. Cyberoam's holistic approach to protect critical infrastructure and ICS follows its philosophy of security being an enabler and not a bottleneck, thereby helping organizations leverage IT infrastructure for business and operational benefits. |