{"id":8612,"date":"2017-08-07T09:00:43","date_gmt":"2017-08-07T17:00:43","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/07\/news-2385\/"},"modified":"2017-08-07T09:00:43","modified_gmt":"2017-08-07T17:00:43","slug":"news-2385","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/08\/07\/news-2385\/","title":{"rendered":"Partnering with specialists to help protect the world\u2019s critical infrastructure from cyber attacks"},"content":{"rendered":"<p><strong>Credit to Author: Daniel Desruisseaux| Date: Mon, 07 Aug 2017 15:46:06 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-39859 size-large\" src=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/08\/BELCO-control-room-with-large-screen_MPI2787-1024x768.jpg\" alt=\"Partnering Cyber\" width=\"1024\" height=\"768\" srcset=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/08\/BELCO-control-room-with-large-screen_MPI2787-1024x768.jpg 1024w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/08\/BELCO-control-room-with-large-screen_MPI2787-300x225.jpg 300w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/08\/BELCO-control-room-with-large-screen_MPI2787-768x576.jpg 768w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/08\/BELCO-control-room-with-large-screen_MPI2787.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>Today in Schneider Electric&#8217;s\u00a0<a href=\"http:\/\/www.schneider-electric.us\/documents\/news\/corporate\/Schneider-Electric-and-Claroty-Cybersecurity-07August2017.pdf\">News Release<\/a> it was \u00a0announced that we are partnering with <a href=\"http:\/\/www.claroty.com\">Claroty<\/a>, an innovator in Operational Technology (OT) network protection, to help to address cybersecurity challenges for the world\u2019s industrial infrastructure. Claroty is joining our <a href=\"http:\/\/www.schneider-electric.com\/b2b\/en\/solutions\/system\/s4\/process-systems-solutions-delivered-by-collaborative-automation-partners\/overview.jsp?\">Collaborative Automation Partner Program (CAPP)<\/a> to make its real-time <a href=\"https:\/\/www.claroty.com\/platform\">industrial control threat monitoring and anomaly detection solution<\/a> available to our customers.<\/p>\n<p><strong>Responding to the changing cyber threat landscape<\/strong><\/p>\n<p>In the past three months, there has arguably been more (at least from a disclosure perspective) threat activity against critical infrastructure\/industrial control networks than we\u2019ve seen in the past few years. With two recent examples of disruptive cyber-attacks against Ukraine\u2019s energy grid, the spill-over ransomware impact to industrial networks caused by <a href=\"https:\/\/www.forbes.com\/forbes\/welcome\/?toURL=https:\/\/www.forbes.com\/sites\/peterlyon\/2017\/06\/22\/cyber-attack-at-honda-stops-production-after-wannacry-worm-strikes\/&amp;refURL=https:\/\/www.google.com\/&amp;referrer=https:\/\/www.google.com\/\">WannaCry<\/a> and <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/jun\/28\/petya-cyber-attack-cadbury-chocolate-factory-in-hobart-hit-by-ransomware\">Petya\/NotPetya<\/a>, and disclosure of a coordinated <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/jun\/28\/petya-cyber-attack-cadbury-chocolate-factory-in-hobart-hit-by-ransomware\">campaign against global nuclear and energy firms<\/a>, we are entering a new reality of increasing danger to the world\u2019s critical infrastructure.<\/p>\n<p>We\u2019ve long stated that safety and cybersecurity must be addressed in a comprehensive way for industrial customers. Cybersecurity must be designed into the components that make up the automation system. In addition, services to support customers who need assistance to secure their networks, and the selection of best-in-class security technology partners complements and helps to build a best-in-class secure system. An essential part of system defense is monitoring for intrusion or irregular behavior so it can be detected before an attack occurs.<\/p>\n<p><strong>Security monitoring system requirements in industry<br \/> <\/strong>For a threat detection system to be beneficial in the industrial sector it must meet several criteria:<\/p>\n<ol>\n<li>The system must cater to the industrial sector and its users, including the ability to recognize industrial systems, products, and protocols and have a global support system that aligns with industrial needs. A system designed for the industrial environment meets these needs whereas systems adapted from an enterprise focus will often struggle.<\/li>\n<li>The solution must be able to run in a mode where it can \u201cdo no harm\u201d within industrial control systems \u2013 its approach must not introduce the potential for down-time or an impact on safety.<\/li>\n<li>The solution must be complete enough to address external threats, internal threats, and unintentional human error that could cause safety concerns or disruption.<\/li>\n<\/ol>\n<p>The partnership with Claroty provides real-time network monitoring and anomaly-detection. In addition, their approach of passive, deep packet inspection (DPI) helps fulfil these criteria. The ability to explore the deepest level of industrial network protocols without adversely impacting the system enables end users to safely identify anomalies while protecting complex and sensitive industrial networks.<\/p>\n<p>Proactive protection of <a href=\"http:\/\/www.schneider-electric.com\/b2b\/en\/products\/automation-and-control.jsp\">industrial control systems<\/a>, and continuous monitoring of industrial networks for cyber threats, creates a detailed inventory of industrial network assets, identifies misconfigurations, monitors traffic between assets, and finds anomalies that may indicate the presence of a malicious actor.<\/p>\n<p>Finally, Claroty\u2019s ability to understand not only the public Modbus protocol, but also our programming protocols and <a href=\"http:\/\/www.schneider-electric.com\/en\/product-range\/63681-triconex-safety-systems\">Triconex<\/a> protocols, means that this solution can not only detect deviations to normal behavior and IT type anomalies in the control room, but it can also alert the shop floor teams on specific attempts to modify the control of the plant.<\/p>\n<p>Cybersecurity is not a one size fits all approach \u2013 <a href=\"http:\/\/www.schneider-electric.com\/b2b\/en\/services\/field-services\/industrial-automation\/industrial-cybersecurity\/industrial-cybersecurity.jsp\">talk to us<\/a> about your specific needs.<\/p>\n<p>&nbsp;<\/p>\n<p>  <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.schneider-electric.com\/?feed-stats-post-id=39848\" width=\"1\" height=\"1\" style=\"display: none;\" \/><\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/08\/07\/partnering-specialists-help-protect-worlds-critical-infrastructure-cyber-attacks\/\">Partnering with specialists to help protect the world\u2019s critical infrastructure from cyber attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/08\/07\/partnering-specialists-help-protect-worlds-critical-infrastructure-cyber-attacks\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Daniel Desruisseaux| Date: Mon, 07 Aug 2017 15:46:06 +0000<\/strong><\/p>\n<p>Today in Schneider Electric&#8217;s\u00a0News Release it was \u00a0announced that we are partnering with Claroty, an innovator in Operational Technology (OT) network protection, to help to address cybersecurity challenges for the&#8230;  <a href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/08\/07\/partnering-specialists-help-protect-worlds-critical-infrastructure-cyber-attacks\/\" title=\"ReadPartnering with specialists to help protect the world\u2019s critical infrastructure from cyber attacks\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/08\/07\/partnering-specialists-help-protect-worlds-critical-infrastructure-cyber-attacks\/\">Partnering with specialists to help protect the world\u2019s critical infrastructure from cyber attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[12845,13400,12894,13177,12608,4500,1011,12667,12544,12508,13401,13402,13403,13404,12475,714],"class_list":["post-8612","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-anomaly-detection","tag-claroty","tag-collaborative-automation-partner-program","tag-cyber-attacks","tag-cyber-security","tag-cybersecurity","tag-energy","tag-industrial-control-systems","tag-innovation-at-every-level","tag-machine-and-process-management","tag-network-monitoring","tag-network-protection","tag-news-release","tag-operational-technology-network-protection","tag-partnership","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8612"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8612\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}