Download PDF
BeyondTrust > Case Studies > Protecting the Grid: CCS and BeyondTrust Team up to Secure Power Plants
BeyondTrust Logo

Protecting the Grid: CCS and BeyondTrust Team up to Secure Power Plants

Technology Category
  • Cybersecurity & Privacy - Endpoint Security
Applicable Industries
  • Electrical Grids
Applicable Functions
  • Business Operation
Use Cases
  • Cybersecurity
Services
  • Cybersecurity Services
The Challenge
Comprehensive Computer Solutions, Inc. (CCS) provides computing solutions for industrial applications, with a significant customer segment in the energy sector. After the 9/11 attacks, CCS was asked by its customers to evaluate security. Prior to this, most of their customers relied solely on perimeter security and proprietary communications channels, which were deemed insufficient post 9/11. CCS's main offering for the energy sector is software that controls the various systems and equipment that generate and deliver electricity. They needed to find a security solution that they could package with their own offerings. The solution needed to be flexible enough to work with Human-Machine Interfaces (HMIs), cost-effective, easy to use, and have a customizable front-end to match the specific needs of power plant IT personnel.
About The Customer
Comprehensive Computer Solutions, Inc. (CCS) is a company that sells computing solutions designed for industrial applications. One of their main customer segments is the energy sector. After the 9/11 attacks, they were asked by their customers to evaluate security. Prior to this, most of their customers relied solely on perimeter security and proprietary communications channels. For the energy sector, CCS's main offering is software which controls the various systems and equipment that generates and delivers electricity. They began evaluating security software, seeking solutions they could package with their own offerings.
The Solution
After evaluating several security options, CCS chose BeyondTrust’s PowerBroker Endpoint Protection solution. Although PBEPP is designed as an Integrated Threat Management solution, with a suite of features that includes antivirus, endpoint protection, vulnerability scanning and more, CCS wanted something more basic: host-based intrusion protection (HIPS). BeyondTrust worked with CCS to package this part of PBEPP with CCS’s energy sector computing solution. PBEPP leverages an intrusion prevention engine that dynamically collects and incorporates new threat data in real time. PBEPP HIPS protects systems regardless of whether or not an attack has been identified and a signature or patch deployed against it. PBEPP blocks zero-day attacks that bypass traditional signature-based solutions, eliminating the need for specific attack signatures. Since the product was launched in 2004, it has successfully thwarted 100% of remote intrusion attempts.
Operational Impact
  • PBEPP HIPS protects systems regardless of whether or not an attack has been identified and a signature or patch deployed against it.
  • PBEPP blocks zero-day attacks that bypass traditional signature-based solutions, eliminating the need for specific attack signatures.
  • Since the product was launched in 2004, it has successfully thwarted 100% of remote intrusion attempts.
Quantitative Benefit
  • Since the product was launched in 2004, it has successfully thwarted 100% of remote intrusion attempts.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.