2016_HSA_Yrbk_YUMPU_r2___
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.indegy.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
A short video depicting the technology:<br />
https://www.youtube.com/watch?v=xsK-1XnUVr4<br />
MODBUS, PROFINET, DNP3 and others, engineering<br />
activities used for programing PLCs, RTUs and DCSs are<br />
carried over proprietary, vendor-specific, and largely<br />
undocumented protocols. This includes all controller<br />
logic updates, configuration changes and firmware<br />
uploads/downloads, use vendor-specific protocols. If we<br />
would compare it to IT networks, these activities would<br />
be called privileged activities. Only that in ICS networks<br />
there are no controls to restrict these activities to privileged<br />
users or monitor them.<br />
Current IT cyber security solutions do not have the<br />
appropriate technology to monitor these proprietary<br />
vendor specific protocols and the engineering activities<br />
that can indicate cyber attacks, identify malicious insiders<br />
or detect human error.<br />
The Indegy Industrial Cyber Security Platform is natively<br />
designed for ICS networks and is the only cyber<br />
security platform capable of providing comprehensive<br />
visibility into the control-plane engineering activities of<br />
OT networks, covering both network activity and direct<br />
physical access to critical assets. As a result of extensive<br />
research by Indegy’s R&D labs, the depth of the<br />
platform’s deep packet inspection (DPI) engine and its<br />
ability to parse in real-time all engineering-level activi-<br />
Continued on next page<br />
“Attacks on industrial control and supervisory control and data<br />
acquisition (SCADA) systems is a continuing problem hanging<br />
over critical infrastructure like power grids and water supplies.<br />
Its appliances protect deployed SCADA devices that may be too<br />
numerous to replace with more secure ones. By monitoring to<br />
find alterations in the control planes of SCADA devices Indegy<br />
can discover potential changes to their programmable logic<br />
controllers that may indicate attacks. This can help discover<br />
threats before they are carried out to older systems lacking<br />
defenses.” – Tim Greene, Senior Editor, Network World<br />
http://www.networkworld.com/article/3080097/security/hot-security-startups-to-watch.html<br />
In Dark Reading, Indegy CEO Barak Perelman explains the<br />
threats to critical infrastructure, “And Now, A Cyber Arms Race<br />
Towards Critical Infrastructure Attacks”<br />
http://www.darkreading.com/attacks-breaches/andnow-a-cyber-arms-race-towards-critical-infrastructure-attacks/a/d-id/1323225?<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron, President<br />
Marc Gendron Public Relations<br />
office: 781-237-0341<br />
cell: 617-877-7480<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
marc@mgpr.net<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron Public Relations<br />
190 Lower County Road<br />
W. Harwich, MA 02671<br />
13