networks and security services infographic...firewall design selection of security appliances based...

2
Actionable data WITH SECURE CONNECTIVITY Enable secure information convergence Reduce enterprise risk Build an information infrastructure Maintain and manage your connected information environment Networks and Cybersecurity Services As part of the Connected Services suite, this set of offerings is focused on helping you assess, design, implement, and manage your OT environment. These automation-agnostic services encompass virtual infrastructure, networks, and cybersecurity. Whether you are a single site or an enterprise, services are scaled to meet you at your journey in a globally consistent manner. PROVEN APPROACH ASSESS/DESIGN IMPLEMENT MANAGE Network Industrial demilitarized zone (iDMZ) Firewall Risk assessment Security posture survey Network* iDMZ Firewall Virtual infrastructure* End point security Threat detection Secure remote access Network* Virtual infrastructure* Firewall Threat detection End point security Secure remote access IT/OT domain expertise Global scale Automation agnostic ROCKWELL AUTOMATION HAS A 90 % DECREASE in troubleshooting time MINUTES to mean time to resolution 60 < * Infrastructure-as-a-service model Virtually eliminating network and server issues Eliminating 100% of CAPEX with redundant architecture and managed support contract Reduction in network and server issues The design, implementation and management of OT network assets led to increased productivity

Upload: others

Post on 07-Oct-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Networks and Security Services Infographic...Firewall design Selection of security appliances based on existing iDMZ rule sets or pre-defined parameters for secure information exchange

Actionable data WITH SECURE CONNECTIVITY

Enable secure information

convergence

Reduce enterprise risk

Build an informationinfrastructure

Maintain and manage your connected

information environment

Networks and Cybersecurity ServicesAs part of the Connected Services suite, this set of offerings is focused on helping you assess, design, implement, and manage

your OT environment. These automation-agnostic services encompass virtual infrastructure, networks, and cybersecurity. Whether you are a single site or an enterprise, services are scaled to meet you at your journey in a globally consistent manner.

PROVEN APPROACH

ASSESS/DESIGN IMPLEMENT MANAGE

NetworkIndustrial demilitarized zone (iDMZ)

FirewallRisk assessment

Security posture survey

Network*iDMZ

FirewallVirtual infrastructure*

End point securityThreat detection

Secure remote access

Network*Virtual infrastructure*

FirewallThreat detection

End point securitySecure remote access

IT/OT domain expertise Global scale Automation agnostic

ROCKWELL AUTOMATION HAS A

90% DECREASE introubleshootingtime

MINUTES tomean time toresolution60<

* Infrastructure-as-a-service model

Virtually eliminating network and server issues Eliminating 100% of CAPEX with redundant architecture and managed support contract

Reduction in network and server issuesThe design, implementation and management ofOT network assets led to increased productivity

Page 2: Networks and Security Services Infographic...Firewall design Selection of security appliances based on existing iDMZ rule sets or pre-defined parameters for secure information exchange

Assess/Design Implement Manage

NETWORKS

Network assessment or designTopology, performance, and remediation planning for current state network or comprehensive future state logical and physical design blueprint

Network implementationDeployment of logical and physical OTnetwork topology design, hardwareprocurement, engineering commissioningservices, and delivery of standardized documentation packages

Network management24x7x365 real time monitoring andadministration services for OT networkswitches, warranty management, firmwareupgrades, and network configuration changes

iDMZ designFunctional specification, policies,procedures, rule sets, security applianceselections, and architecture drawings for a segmented demilitarized zone

iDMZ implementationDeployment of design specifications, micro-services, security appliances, engineering commissioning services, completed documentation packages, and finalized policies and procedures

VIRTUAL INFRASTRUCTURE

Design not required: this is a pre-engineered solution

Virtual infrastructureimplementationSelection, sizing, configuration, deployment,and commissioning of pre-engineered industrial data center solutions

Virtual infrastructuremanagement24x7x365 real time monitoring and administration services for infrastructure uptime and maintenance, disaster recovery, application configuration, with optional capability to deploy anti-virus (AV) management and application server (OS) patch management

SECURITY

Firewall designSelection of security appliancesbased on existing iDMZ rule sets orpre-defined parameters for secureinformation exchange

Firewall implementationProcurement, deployment, start up and commissioning services of firewall appliances with optional documentation packages forarchitecture drawings, documentedrule sets, policies and procedures

Firewall management24x7x365 real time monitoring andadministration services for firewallappliances, including hardwarewarranty management, and administration of firmware updates

Risk assessmentQuantitative or qualitative impact assessment of vulnerability x threat x consequence based on global framework standards

End point security implementationDeployment of anti-malware management solutions, software, or 3rd party services for end devices

End point security management24x7x365 real time monitoring and deployment services of anti-virus environment with documented architectures and scheduled updates for defined assets

Security posture surveySimplified cybersecurity hygiene score and report to prioritize remediation plans for found or known vulnerability

Threat detection implementationScaled site or enterprise wide deployment with onsite or offsite engineering services for configuration, optional enterprise management council (EMC) configuration

Threat detection management24x7x365 real time monitoring andadministration services forcompute infrastructure

Secure remote access implementationOnsite or remote engineering services to provide configuration and testingfor remote user system access

Secure remote access management24x7x365 remote administration ofusers and access rights

Networks and cybersecurity services

your move to a connected enterprise today. We’re here to guide you at any part of your journey to zero downtime and operational efficiency.START

Allen-Bradley and Expanding human possibility are registered trademarks of Rockwell Automation, Inc. Trademarks not belonging to Rockwell Automation are property of their respective companies.

Publication GMSN-SP014A-EN-P June 2020 Copyright © 2020 Rockwell Automation, Inc. All Rights Reserved. Printed in USA.