Transcript
Page 1: SECURITY CONVERGENCE TILITIES & CRITICAL NFRASTRUCTURES · 2019-12-02 · Delivering a Business Layer across Systems and Applications – Empower your business managers with a complete

SOLUTIONSHEET

ALERTENTERPRISE SOLUTIONS

ENTERPRISE GUARDIAN

ENTERPRISE SENTRY

IDENTITY INTELLIGENCE TECHNOLOGY

ENTERPRISE VISITOR IDENTITY MANAGEMENT

CAPABILITIES• Physical-LogicalIdentityandAccess

•Governance:Contractor/EmployeeOnboardingOffboarding

•ActiveEnforcementofNERCReliabilityStandards

•CyberCriticalAssetMonitoringandNERCCIPCompliance

•RemoteSubstation/ControlRoomMonitoring

•ComplexThreatPrevention–Cyber,PhysicalandAdvancedPersistentThreats

•EnhancedSOCOperations(SecurityOperationsCenter)

•SmartGridandAdvancedMeteringInfrastructureSecurity

[email protected] | ALERTENTERPRISE.COM

[ 1+1+1 = 0 ]The New Math for Information Technology, Operational Technology and Physical Security for Secure Workforce and Workplace Access Management

Utilitiesareextra-criticalinfrastructureswithcomplexsecurityrequirements.Newsophisticatedthreatsthatliveinbothcyberandphysicaldomainsstandpoisedandreadytoattack—withpotential,ongoingrisktoIT,OperationalTechnology(OT),andPhysicalSecurity.Addressingtheseescalatingthreatsrequiresanewformulaandapproachwhere1+1+1equals0.Withtheobjectiveofzerocomplianceviolationsandanewlevelofsecurity,aconvergedsolutionisthebestwaytoclosethesecuritygapsanddeliverautomatedpolicyandcomplianceenforcement.

AlertEnterprisedeliversenterprise-widesecurity,governance,compliance,policyenforcement,automationandworkforcemanagementtotheUtilityandCriticalInfrastructuresectorsinasingleplatformthatmakesphysicalandlogicalaccessandidentitymanagementaseamlesspartofbusinessoperations.

SECURITY CONVERGENCEFOR UTILITIES & CRITICAL INFRASTRUCTURES

GSIV

Page 2: SECURITY CONVERGENCE TILITIES & CRITICAL NFRASTRUCTURES · 2019-12-02 · Delivering a Business Layer across Systems and Applications – Empower your business managers with a complete

REAL-WORLD INCIDENTSDEMAND A WORLD-CLASS RESPONSEAlertEnterpriseprovidesleadingIdentityandAccessGovernancealongwithSecurityIncidentManagementandResponsesoftwareforUtilitiesandCriticalInfrastructure.

ENTERPRISE IDENTITYAND ACCESS GOVERNANCEDelivering a Business Layer across Systems and Applications–Empoweryourbusinessmanagerswithacompleteviewofriskssotheycanmakeaccessandsecurity-relateddecisionswithoutexcessivedemandsonIT.Oursoftwareintegratesacrossenterpriseapplications,legacysystems,physicalfacilitiesandcriticalassets.

Identity Governance, Physical-Logical Convergence–Taketheguessworkoutofapprovingaccesstoapplicationsbasedonspecificroleswithintheorganization.Managephysicalaccesstofacilities,substations,controlroomsandpowergenerationstations–fromoneplace.

Automate Contractor / Employee Onboarding Off boarding–Real-timeintegrationwithleadingHRsystemssuchasSAPSuccessFactors,allowsyoutoconductupfrontriskanalysisfortheentirepopulation,streamliningandautomatingsecurephysicalaccessprovisioning.

IT-OT Convergence: Managing Access to Operational Systems–MonitorallyourOperationalsystems(EnergyManagementSystemsforTransmissionOperations,ProtectiveRelaysinSubstationsorGenerationManagement)whileprovidinggranularOTaccesscontrolpermissions.WithOTconvergence,oursoftwareallowsonlythosewithalegitimateneedtoaccesscriticalassets.

Operational Compliance Reporting–ExtendthecapabilitiesofcomplianceapplicationslikeSAPGRCtoincludemonitoringofNERCandNERCCIPcontrols,aswellasStateorLocalPublicUtilityCommissionGuidelines.

SOLUTIONSHEET

[email protected] | ALERTENTERPRISE.COM

AlertEnterprise software extends beyond ITto include security and operational risk management for power generation, transmission, distribution and the Smart Grid, delivering operational security across the entire Utility and other Critical Infrastructure Enterprise.

• IDENTITY AND ACCESS GOVERNANCE

• CYBER AND PHYSICAL INCIDENT MANAGEMENT

• OPERATIONAL COMPLIANCE (NERC, CIP, ETC.)

ENTERPRISEGUARDIAN

ENTERPRISESENTRY

IDENTITYINTELLIGENCE

VISITOR IDENTITYMANAGEMENT

CYBER | IT

PHYSICAL

SCADA | OT

V

I

S

G

• IDENTITY AND ACCESS GOVERNANCE

• CYBER AND PHYSICAL INCIDENT MANAGEMENT

• OPERATIONAL COMPLIANCE (NERC, CIP, ETC.)

ENTERPRISEGUARDIAN

ENTERPRISESENTRY

IDENTITYINTELLIGENCE

VISITOR IDENTITYMANAGEMENT

CYBER | IT

PHYSICAL

SCADA | OT

V

I

S

G

Page 3: SECURITY CONVERGENCE TILITIES & CRITICAL NFRASTRUCTURES · 2019-12-02 · Delivering a Business Layer across Systems and Applications – Empower your business managers with a complete

SECURITY OPERATIONSAND THREAT PREVENTIONRemote Substation, Transmission Control Room Monitoring: MeetSCADA-relatedsecurityandsafetychallengeshead-on.AlertEnterprisesoftwareenablesyoursecuritypersonneltocorrelatestaffentryintosensitivelocationswithwork-orderissuanceaswellasprioraccesspatterns.

SOC Enhancement, Continuous Monitoring, Incident Management and Informed Response: CombinethemonitoringofbadgeaccessactivityviavideosurveillancewithIT,HRandcybersecurityrelatedinformationinasingleunifiedapplication.AlertEnterprisesoftwarecanleveragein-memoryfastcomputingcapabilitiesofSAP®HANA™tomineinformationthroughmillionsofevents,alertsandactionsforsplit-secondinformedresponse.

Smart Grid Security:Detectend-pointcyberattacksaswellasblendedphysical-logicalthreatsagainstgateways,head-endsandcontrolpoints,toensurereliabilityandprovideprotectionfrommaliciousthreatactors.

Nuclear Critical Digital Asset (CDA) Monitoring and Reporting:Proactivelyenforceprovisionsof10CFR73.54and73.55byautomatingthemonitoringandassessmentsforCyberDigitalAssets(CDAs).

Unified Threat Management: Physical Threats, Insider Threats, Cyber Threats and Advanced Persistent Threats: Gainaunifiedviewofthreatsacrosstheenterpriseanddeployrules-basedsolutionstopreventmaliciousacts,sabotage,terrorismandcyberthreats.

NERC CIP COMPLIANCEEnable security, risk and compliance management professionalswithinyourorganizationtonotonlydetectandidentifyviolations,buttoremediatetheminreal-time.Oursoftwareenablesyoursecuritystafftoremovephysicalaccesstosystemsandfacilitieswithasingleclickandinvokemitigatingcontrolslikeadditionalvideosurveillanceorproximitytracking.

SOLUTIONSHEET

[email protected] | ALERTENTERPRISE.COM

©2019AlertEnterpriseInc.Allrightsreserved.AlertEnterprise,EnterpriseGuardianaretrademarksofAlertEnterpriseInc.Othernamesandlogosmentionedhereinmaybethetrademarksoftheirrespectiveowners.

With the objective of zero compliance violations and a new level of security, a converged solution is the best way to close the security gaps and deliver automated policy and compliance enforcement.


Top Related