Download PDF
Claroty > Case Studies > Electric Utilities
Claroty Logo

Electric Utilities

 Electric Utilities - IoT ONE Case Study
Technology Category
  • Cybersecurity & Privacy - Identity & Authentication Management
  • Cybersecurity & Privacy - Intrusion Detection
  • Cybersecurity & Privacy - Malware Protection
Use Cases
  • Cybersecurity
  • Cybersecurity Services
The Challenge

Effectively securing its generation and transmission operations required the company to confront and overcome the following challenges:

  1. Inherently insecure OT networks: Complex and widely distributed architecture, limited OT visibility, and inadequate security controls gave attackers hundreds of possible entry points into the company’s OT networks.
  2. OT redundancy: The redundancy of the company’s OT environment meant that attacks were typically only detected if they caused immediate, easily noticeable damage. 
  3. Heavy reliance on OT remote access: The company’s power plants utilize a large number of unmanned power generation units and also rely on multiple vendors to maintain and service their heat recovery generation systems (HRGS). 
The Customer

Power Generation and Transmission Company- Name not disclosed

About The Customer

The company serves millions of customers over a nationwide transmission network

The Solution

The company deployed The Claroty Platform on top of its existing infrastructure and utilized the following components:

  1. Continuous Threat Detection (CTD) for full-spectrum OT asset visibility, continuous security monitoring, and real-time risk insights with zero impact on operational processes and underlying devices.
  2. Secure Remote Access (SRA) to safeguard OT networks from threats introduced via potential misconfigurations and unauthorized users, including third-party contractors.
  3. Enterprise Management Console (EMC) to simplify management overall, consolidating data from across The Claroty Platform and providing a unified view of assets, activities, and alerts across multiple sites. The platform also integrates seamlessly via EMC with IT infrastructure.
Operational Impact
  • [Data Management - Cyber Security]

    Comprehensive alerting and root-cause analysis mechanisms that enable the company’s security operations center (SOC) to know precisely when and why any anomalous or malicious activity occurs anywhere in any of its power plants’ OT networks.

  • [Efficiency Improvement - Operation]

    Continuous, real-time assessment and reporting of the company’s overall OT risk profile automating and expediting what was once a tedious manual process

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.

Thank you for your message!
We will contact you soon.