Download - Stealth for Industrial Manufacturing
EXECUTIVE OVERVIEW
Protect Production and Intellectual Property
UNISYS STEALTH ACCELERATES TIME-TO-MARKET WITHOUT SACRIFICING SAFETY AND SECURITY
Executive Overview2
Zero Incidents: Your Goal. Our Mission.Today, most automated manufacturing process
systems are connected to business networks.
As a result, modern industrial automation controls
and human-machine interfaces (HMIs) run on the
same hardware and software as their business
networks, such as Intel processors and Microsoft
Windows or Linux operating systems. Because of
the interconnected world of modern manufacturing,
industrial controls are subject to malicious code that
can propagate throughout the entire manufacturing
execution system (MES) and machine to machine
(M2M) environment. According to a report in
Engineering and Technology, “Key information
regarding vulnerabilities in Industrial Control Systems
(ICS) and Supervisory Control and Data Acquisition
(SCADA) systems is now openly available from a
range of sources on the public Internet.”1
In addition, legacy control systems, never meant
to interface or be exposed to common IP-based
networks, may be especially vulnerable as they
were not designed to operate in such a highly
1 Hayes, Jim. Critical infrastructure hack data found in public domain. Engineering and Technology Magazine, January 28, 2014.
interconnected environment. Manufacturers must pro-
tect both types of controls: “black box” legacy controls
and more modern, microprocessor-based systems.2
How can manufacturers protect their critical process
controls and enterprise assets from advanced
persistent threats (APT) and other sophisticated
cyber threats while also accelerating time-to-market
and reducing costs? With Unisys Stealth™, you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
point-to-point encryption.
Consolidate. Reduce reliance on physical
IT infrastructure.
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
2 Pinto, Jim. Automation & IT systems are different. Automation.com http://www.automation.com/library/articles-white-papers/articles-by-jim-pinto/automation-systems-cyber-security
Keep Critical Infrastructure Secure
Executive Overview3
STEALTH COMMUNITIES OF INTEREST
Stop Cyber Assaults Before They HappenUnisys Stealth takes a radically different approach
to addressing security threats by making endpoints
such as SCADA/ICS and PLCs on HMI and M2M
networks invisible to unauthorized users and by
securing data-in-motion across any network.
This is how Stealth can help industrial organizations
Get to Zero Incidents.
By creating highly-trusted communities of interest
(COI), Stealth is designed to allow only authorized
users to access devices, applications, and systems
critical to manufacturing system infrastructure.
Intellectual property can be protected from theft,
and production lines and systems can be secure.
In addition to strengthening mission-critical protection,
manufacturing organizations can reduce infrastructure
costs by safely modernizing their industrial controls
and software with one unified security solution. And
as regulatory mandates change, Stealth can deliver
the agility enterprises need without requiring costly
upgrades or extensive reconfiguration.
Why Stealth Now?Unisys Stealth is the innovative, mission-critical
security that industrial manufacturing organizations
need to help improve safety and secure their supply:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation so you can upgrade
your systems without compromising security.
Reduces risk. Make network-operated ICS/SCADA
devices invisible. Isolate critical systems from the
rest of the enterprise. Tighten access control based
on user identity.
Facilitates compliance. Stealth can help achieve
compliance with the Executive Order on Improving
Critical Infrastructure Cybersecurity, and other
regulatory requirements and recommendations.
Reduces costs. Protect enterprise customer data,
accounting, production, and ICS/SCADA with one
cost-effective security solution—Stealth can cover
both business and supply processes.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving regulatory
requirements or mission/business needs.
You Can’t Hack What You Can’t See
STEALTH COMMUNITIES OF INTEREST
NETWORK COMMAND & CONTROL CENTER
Go Invisible. You control who can access—or even see—SCADA/ICS, command and control systems, and other endpoints.
TRUSTED USER (COI)
TRUSTED USER (COI)
UNAUTHORIZED USER
x
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.
Stealth is What Innovative Security Looks LikeWhen it comes to critical infrastructure, there
can be no compromise. Stealth can help move
your organization from vulnerable to mission-
critically secure. But don’t take our word for it.
Read Network World’s May 2014 independent
review of Stealth and see why Stealth might
just be “a great way to hide from hackers.”
www.unisys.com/gettozero
Contact us: [email protected]
Protect What Matters Most
Incidents
YOUR GOAL. OUR MISSION.