03.03.2017 Views

2016_HSA_Yrbk_YUMPU_r2___

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.indegy.com/<br />

Link to additional information:<br />

––––––––––––––––––––––––––––––––––––––––<br />

A short video depicting the technology:<br />

https://www.youtube.com/watch?v=xsK-1XnUVr4<br />

MODBUS, PROFINET, DNP3 and others, engineering<br />

activities used for programing PLCs, RTUs and DCSs are<br />

carried over proprietary, vendor-specific, and largely<br />

undocumented protocols. This includes all controller<br />

logic updates, configuration changes and firmware<br />

uploads/downloads, use vendor-specific protocols. If we<br />

would compare it to IT networks, these activities would<br />

be called privileged activities. Only that in ICS networks<br />

there are no controls to restrict these activities to privileged<br />

users or monitor them.<br />

Current IT cyber security solutions do not have the<br />

appropriate technology to monitor these proprietary<br />

vendor specific protocols and the engineering activities<br />

that can indicate cyber attacks, identify malicious insiders<br />

or detect human error.<br />

The Indegy Industrial Cyber Security Platform is natively<br />

designed for ICS networks and is the only cyber<br />

security platform capable of providing comprehensive<br />

visibility into the control-plane engineering activities of<br />

OT networks, covering both network activity and direct<br />

physical access to critical assets. As a result of extensive<br />

research by Indegy’s R&D labs, the depth of the<br />

platform’s deep packet inspection (DPI) engine and its<br />

ability to parse in real-time all engineering-level activi-<br />

Continued on next page<br />

“Attacks on industrial control and supervisory control and data<br />

acquisition (SCADA) systems is a continuing problem hanging<br />

over critical infrastructure like power grids and water supplies.<br />

Its appliances protect deployed SCADA devices that may be too<br />

numerous to replace with more secure ones. By monitoring to<br />

find alterations in the control planes of SCADA devices Indegy<br />

can discover potential changes to their programmable logic<br />

controllers that may indicate attacks. This can help discover<br />

threats before they are carried out to older systems lacking<br />

defenses.” – Tim Greene, Senior Editor, Network World<br />

http://www.networkworld.com/article/3080097/security/hot-security-startups-to-watch.html<br />

In Dark Reading, Indegy CEO Barak Perelman explains the<br />

threats to critical infrastructure, “And Now, A Cyber Arms Race<br />

Towards Critical Infrastructure Attacks”<br />

http://www.darkreading.com/attacks-breaches/andnow-a-cyber-arms-race-towards-critical-infrastructure-attacks/a/d-id/1323225?<br />

Nominating contact for this entry:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Marc Gendron, President<br />

Marc Gendron Public Relations<br />

office: 781-237-0341<br />

cell: 617-877-7480<br />

Nominating contact email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

marc@mgpr.net<br />

Nominating organization address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Marc Gendron Public Relations<br />

190 Lower County Road<br />

W. Harwich, MA 02671<br />

13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!