McAfee and Intel protect the critical infrastructure together
Posted on 15 May 2012.
McAfee announced a collaboration with Intel to better protect the world’s energy utility ecosystem, including generation, transmission and distribution, from increased cyber attacks. The two companies have provided a blueprint for a solution of multiple products that create layers of security and operate together without great complexity or without impacting availability.

Solutions from McAfee and Intel deliver a variety of technologies for securing the energy infrastructure environments, decreasing chances of malicious attacks, increasing uptime and decreasing resource-intensive responses to fix and update systems.

Challenges facing energy infrastructure

The complexity and diversity of the electrical power delivery systems make protecting them from cyber attacks very difficult. Energy provider’s infrastructure is comprised of a diverse set of networks that cannot be effectively secured by simply adding technologies designed for typical enterprise IT environments. Many of the power grids’ aging assets predate the internet revolution and are particularly vulnerable from attack and unable to identify or report malicious activity up the network chain. Substations, known as one of the most vulnerable parts of the smart grid, are particularly at risk from attack. Meanwhile, hackers have grown more sophisticated, increasing the need to defuse or deter zero-day and more sophisticated attacks.

Securing electric power delivery is an enormous task because of:
  • Multiple zones included: Corporate IT, SCADA, and device networks: Each different zone has unique technical challenges.
  • Coping with “big data” overload: Security devices on the network produce incredibly large number of logs, overwhelming stretched IT departments.
  • Simplifying endpoint manageability and improving visibility: Energy endpoints are spread geographically and rarely updated and, many times, lack the ability to detect or communicate and identify a security breach. Device failures can be costly especially when they require updates if not properly managed.
  • Providing the right security context for the grid: Standard IT products don’t have the right features to identify issues within the energy infrastructure or don’t understand the unique utility lexicon making it difficult to apply specialized measures need for control systems.
Joint reference implementation

McAfee and Intel created a “reference implementation” that integrates a number of McAfee security solutions relevant to substations and network operations centers with selected Intel processors and hardware-based security and manageability technologies.

The reference implementation emulates the components and functionality commonly found in a critical infrastructure environment. The added capability of end-point security, network security and security management solutions can deliver a secure environment with increased reliability.

The "reference implementation" allows the audience to witness the system response of an unsuccessful cyber-attack thwarted by McAfee Embedded Control and the impact of a successful attack on an "improperly configured" system. The audience can see how the critical infrastructure operator can remotely and securely mitigate the threat of the comprised "improperly configured" system with McAfee's ePolicy Orchestrator coupled with Intel vPro Technology.

Protecting utility infrastructure is challenging for many reasons including network diversity, data overload, complex endpoint management and tools that lack the right security context for energy. McAfee unifies situational awareness and multi-zone protection using purpose-built, compliance-oriented solutions to prevent attacks. This end-to-end security solution features remote management using Intel AMT to lower device support costs.





Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //