Post on 21-Jul-2015
EXECUTIVE OVERVIEW
Keep Water Supplies Safe from Cyber Threats
DON’T BE A TARGET. GO DARK WITH UNISYS STEALTH.
Executive Overview2
Zero Incidents: Your Goal. Our Mission.To provide safe water for public use, water distribution
and treatment utilities have heavily invested in
automated systems to improve reliability, safety,
and to meet ever-stricter regulatory demands.
These modernized systems are increasingly
dependent on Remote Telemetry Units (RTUs),
Industrial Control Systems (ICS) and Supervisory
Control and Data Acquisition systems (SCADA).
These systems are critical to not just the monitoring
and efficient distribution of our water supply, but
also are critical in areas such as water filtration
and chlorine, ammonia, and fluoride dosing. But
these components are in the cross-hairs of
Advanced Persistent Threats (APT) and many other
cyber-threats. Primary targets include:
1) ICS/SCADA and related RTUs. These systems
make up nearly seven percent of the entire SCADA
installed base.1 This amounts to hundreds of
thousands of targeted water control units. As demand
and greater water conservation and treatment
technologies improve, water utilities will deploy even
more ICS/SCADA/RTUs.
1 Frost & Sullivan, Strategic Analysis of the Global SCADA Market, March 2013
2) Command and control centers. These remote
units and controls are routed through central
command centers at most utilities. However,
the communication to and from these field units
is over a variety of mediums: radio, wireless,
and Ethernet connections to the centers’ Human-
Machine Interfaces (HMIs).
How can water treatment facilities strengthen mission-
critical security, reduce costs, and increase agility—
all at the same time? With Unisys Stealth™, you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
point-to-point encryption.
Consolidate. Reduce reliance on physical
IT infrastructure.
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
Keep Critical Infrastructure Secure
Executive Overview3
STEALTH COMMUNITIES OF INTEREST
Stop Cyber Assaults Before They HappenUnisys Stealth takes a radically different approach
to addressing security concerns by making ICS/
SCADA/RTU endpoints and the command and
control center network invisible to unauthorized
users and by securing data-in-motion across any
network. This is how Stealth can help water utilities
Get to Zero Incidents.
By creating highly-trusted Communities of Interest
(COI), Stealth is designed to allow only authorized
users to access devices, applications, or systems
critical to water supplies and water treatment
facilities. In addition to strengthening mission-
critical protection, water treatment utilities can
reduce infrastructure costs by safely modernizing
their industrial controls and software with one unified
security solution. And as regulatory mandates change,
Stealth can deliver the agility utilities need without
requiring costly upgrades or extensive reconfiguration.
Why Stealth Now?Unisys Stealth is the innovative, mission-critical
security that water utilities need to help maintain
reliability, safety, and security:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation so you can upgrade
your systems without compromising security.
Reduces risk. Make RTU and ICS/SCADA endpoints
invisible. Isolate critical systems from the rest
of the enterprise. Tighten access control based
on user identity. Protect data-in-motion with
high-level encryption.
Facilitates compliance. Stealth can help achieve
compliance with the Executive Order on Improving
Critical Infrastructure Cybersecurity, and other
regulatory requirements and recommendations.
Reduces costs. Protect the water utility enterprise,
including customer data, accounting, and distribution
and treatment with one cost-effective security solution.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving regulatory
requirements or mission/business needs.
You Can’t Hack What You Can’t See
NETWORK COMMAND & CONTROL CENTER
TRUSTED USER (COI)
TRUSTED USER (COI)
UNAUTHORIZED USER
Go Invisible. You control who can access—or even see—SCADA/ICS, command and control systems, and other endpoints.
x
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.
Stealth is What Innovative Security Looks LikeWhen it comes to critical infrastructure, there
can be no compromise. Stealth can help move
your organization from vulnerable to mission-
critically secure. But don’t take our word for it.
Read Network World’s May 2014 independent
review of Stealth and see why Stealth might
just be “a great way to hide from hackers.”
www.unisys.com/gettozero
Don’t Be a Target. Go Invisible.
Contact us:
Eastern Region:Paul Armstrong, 310-944-0833paul.armstrong@unisys.com
Central Region:Steve Walston, 972.629.4270steve.walston@unisys.com
Western Region:Loren Barnett, 303.518.5102loren.barnett@unisys.com
Federal:Sandy Holland, 703.447.4490sandra.holland@unisys.com
TOLA:Kim Henry, 469.939.0889Kimberly.henry@unisys.com
Business Development:Karen Walsh, 304.579.0391karen.walsh@unisys.com
Lari Young, 703.507.3401lari.young@unisys.com
Canada:Beverly Golchuk, 416.770.0662beverly.golchuk@unisys.com
UK:Simon Totterdell, +44 787.299.4090simon.totterdell@unisys.comwww.unisys.com/stealth