Information & Cyber Security

Information & Cyber Security

INDUSTRIAL CONTROL SYSTEM SECURITY - PERFORMANCE AND RELIABILTY

Our Information & Communication Technology (ICT) philosophically believes that the process itself is what is at stake here. Instead of trying to protect data like your personal banking information, in an industrial control system we are trying to control and protect a process. By focusing on the process, we are able to make cyber security a manageable engineering problem. For instance, if you are running a process like a chemical reactor and it can become unstable in certain scenarios, then we focus on insuring that those scenarios can never be created even if a hacker has complete control and knowledge of the process and control system.

Our ICT services are described below.

Policy & Procedure Development

We work closely with your organization to evaluate or develop a cybersecurity policy and procedures that are appropriate for industrial control systems. We will work with your team to insure agreement across your organization, rollout, and adoption. The established policy & procedures will drive security focused behaviors without compromising performance and connectivity. It will also establish a method for budgeting decisions, and accountability.

Network Design & Migration Planning

Our services start with robust & secure industrial network design and migration planning. Design services are based on solid industrial control system network design with secure communication and reliability as defined in ISA/IEC 62443 and other standards as required by your industry or region of the world. Our design services focus on providing secure and reliable industrial networks including designs to implement SIEM and other cybersecurity monitoring like Nozomi Networks SCADAGuardian that will serve your business well with better visibility, secure remote connectivity, and less unexplained downtime.

Network Performance Testing

In addition to ICT Design and Migration Planning, occasionally an industrial network just doesn’t work correctly. This manifest itself as a “spooky” network, unreliable, or you might even think you are being “hacked”. Our team will work with yours to analyze why your network is not working properly and remedy the problem. This service is also beneficial where several vendors are pointing the guilt to each other without solving the problem.

Vulnerability Assessment & Penetration Testing

A vulnerability assessment evaluates the ICT network for security primarily. We also analyze for performance and reliability. In a vulnerability assessment, we analyze your network architecture, critical assets or processes, network technologies, data flows, process flow diagrams, and previous assessments including risks assessments like HAZOP. A vulnerability assessment will identify vulnerabilities and rank them, remove false positives, and develop prioritized recommendations for remediation. Our final report includes asset inventory, vulnerabilities discovered, severity ratings and recommendations, overview of tools and methods utilized and findings. Once the project is complete, we either destroy or return of all raw data. While a vulnerability assessment is passive, a penetration test is performed with specific written permission to pursue vulnerabilities further into the system to discover the extent of possible exposure or risk.

Experience

Our work history includes projects in process industries, discrete manufacturing, Oil and Gas, Petrochemical Industry. Our investigators have many years of experience in the development, design, and operation of industrial control systems, building automation systems, and many different embedded controllers and protocols.

OWL Data Diode

A hardware that physically enforces a one-way flow of data. As one-way data transfer systems, data diodes are used as cybersecurity tools to isolate and project networks from external cyber threats and prevent penetration from any external sources. A data diode sits at edge of the network security perimeter, relying on its physical hardware components to mitigate all network cyber threats against the network while simultaneously allowing the transfer of data out of the network in a highly controlled and determined manner.

Veritas Simplified Disaster Recovery

Veritas Backup Exec is a high-performance data management solution for Windows servers networks. With its client/server design, Backup Exec provides fast, reliable backup and restore capabilities for servers, applications, and workstations across the network. Backup Exec is available in several configurations that can accommodate networks of all sizes. In addition, Backup Exec's family of agents and features offers solutions for scaling your Backup Exec environment and extending platform and feature support.

McAfee EPO Orchestrator

McAfee ePO Antivirus can unify security management across endpoints, networks, data, and compliance solutions from McAfee and third-party solutions. McAfee ePO software provides flexible, automated management capabilities so we can identify, manage, and respond to security issues and threats.
We can define how McAfee ePO software should direct alerts and security responses based on the type and criticality of security events in our environment, as well as create automated workflows between our security and IT operations systems to quickly remediate outstanding issues.

Tripwire

The Tripwire solution is designed to connect security to the organization’s mission, by providing robust and flexible tools that automate security configuration management against most of the frameworks being used today. Tripwire’s tools analyze, identify, prioritize, and remediate security risks due to non-compliant network devices, servers, workstations and applications.

Imprivata Single Sign on Solution

Imprivata OneSign offers a practical and affordable way to achieve regulatory compliance while also eliminating password management problems, improving security, reducing IT help desk costs, and improving user productivity. OneSign is made of two main components,

  • Authentication Management
    - This part of OneSign helps us log into Windows .One aspect of this is the ability to use strong authentication, which reduces the possibility of theft of our account details.

  • Single Sign-On
    - This aspect of Imprivata helps us log into our applications. Typically, 10-20 usernames and passwords are not uncommon and they can be challenging to recall. SSO remembers these logins for us .In some organizations it is also necessary to access systems remotely.


Virtual Fortinet Firewall

Organizations embracing private and public clouds need network security that complements traditional physical appliance form factors to gain visibility and maintain consistent security policy as workloads, users, and data migrate to more agile, elastic, and virtualized infrastructure.
To provide consistently top-rated security, greater visibility, and unmatched performance, FortiGate virtual appliances give you the unique combination of the most advanced threat intelligence from FortiGuard Labs with a common FortiOS Operating System, simplifying management across physical, virtual, and cloud deployments.


Juniper Networks

Juniper Networks designs and markets IT networking products, such as routers, switches and IT security products. Juniper is the third largest market-share holder overall for routers and switches used by Industries. Juniper offers seven different SRX models, from small units for branch offices to large models for supporting the largest of networks. The rated throughput firewalls range from 700 Mbps to 200 Gbps, which are the highest throughput levels.