The cybersecurity of industrial systems and critical infrastructures is of vital importance,” says Eugene Kaspersky, founder and CEO of Kaspersky Labs, “an increasing number of such systems are using devices and channels that interact with the outside world. Sometimes they use equipment that was never intended for external access, not to mention software that was created decades ago and has not been upgraded since! Our solution is capable of ensuring the cybersecurity of the technology cycle at all levels of automated process control.”
Kaspersky gave the example of Orly airport which used a very old computer system and got closed down by hackers. He said hospitals in Australia, Germany and California had their systems hacked and data wiped this year and the Krainian power grid was taken down by hackers.
There are many other examples, he said, both known and unknown, and these attacks are on the increase.
Kaspersky Lab’s answer to the threat is Kaspersky Industrial CyberSecurity which delivers protection to the ICS network at the layers most vulnerable to cyber-attacks –ICS/SCADA servers, HMI panels, engineering workstations, PLCs and more – securing them from cyber-threats without affecting operational continuity and consistency of the technological process,’ says the company.
‘The solution offers a combination of conventional security technologies, adapted for an ICS environment, such as anti‑malware protection, whitelisting and vulnerability assessment functionality. This strong foundation is enhanced further with unique technologies designed specifically for industrial environments, including Integrity check for PLC programs, Semantic monitoring of process control commands and Telemetry data to detect cyber-attacks targeting the physical part of an infrastructure,’ says the company.
Kaspersky Industrial CyberSecurity also provides a special Observability Mode that is focused only on the detection of cyber-attacks, operation personnel faults and anomalies inside an industrial network. All prevention and detection technologies are managed via a single centralised management console.
An efficient approach to security always starts with industrial cybersecurity training, both for IT security professionals and general employees (awareness programs) targeting the personnel awareness gap and mitigating the risks of human error. Awareness training programs include Baseline Security in ICS, Social attack in critical infrastructure environment and others.
Expert services include Cyber Security assessment and Penetration Testing. They allow customers to strengthen their own intelligence, manifest the most critical vulnerabilities, including zero-day, and predict cyber-threats relevant to the company’s specific industrial assets and technological processes. Incident Response services delivered by our dedicated industrial cybersecurity team all around the globe help to localise the intrusion, mitigate consequences, stop attackers from penetrating further into the infrastructure, prevent subsequent attacks on a compаny and develop incident response plan for the future.
They customisable settings of Kaspersky Industrial CyberSecurity mean it can be configured in strict accordance with the requirements of different industries, facilities and production lines, allowing the solution to be effectively integrated into an organisation’s existing ICS network and technological processes without any significant modifications both to the network and to the process.
Kaspersky Industrial CyberSecurity has been piloted at the VARS petrochemical terminal and TANECO oil refinery.
Marat Gilmutdinov, Head of Industrial Control Systems Department at TANECO, says: “It was important for us to buy more than just a security solution. We needed to put comprehensive security measures in place to protect our operations against cyberthreats at any ICS level. We also needed to work with a vendor capable of assisting with any possible issues during deployment and operation. Just months after deployment, Kaspersky Industrial CyberSecurity detected an unauthorised connection attempt by an outside laptop to one of the controllers. The attackers were attempting to modify the operation settings of a sensor.”
At VARS, technical director Roman Yanukovich, says: “Left unprotected, an IT security breach could severely disrupt and disable our automated operations with severe implications for the port’s commercial viability, the safety of our employees, the population of the nearby town of Ventspils, not to mention the risk of potential contamination of the Baltic sea

إرسال تعليق