下载PDF
BeyondTrust > 实例探究 > Protecting the Grid: CCS and BeyondTrust Team up to Secure Power Plants
BeyondTrust Logo

Protecting the Grid: CCS and BeyondTrust Team up to Secure Power Plants

技术
  • 网络安全和隐私 - 端点安全
适用行业
  • 电网
适用功能
  • 商业运营
用例
  • 网络安全
服务
  • 网络安全服务
挑战
Comprehensive Computer Solutions, Inc. (CCS) provides computing solutions for industrial applications, with a significant customer segment in the energy sector. After the 9/11 attacks, CCS was asked by its customers to evaluate security. Prior to this, most of their customers relied solely on perimeter security and proprietary communications channels, which were deemed insufficient post 9/11. CCS's main offering for the energy sector is software that controls the various systems and equipment that generate and deliver electricity. They needed to find a security solution that they could package with their own offerings. The solution needed to be flexible enough to work with Human-Machine Interfaces (HMIs), cost-effective, easy to use, and have a customizable front-end to match the specific needs of power plant IT personnel.
关于客户
Comprehensive Computer Solutions, Inc. (CCS) is a company that sells computing solutions designed for industrial applications. One of their main customer segments is the energy sector. After the 9/11 attacks, they were asked by their customers to evaluate security. Prior to this, most of their customers relied solely on perimeter security and proprietary communications channels. For the energy sector, CCS's main offering is software which controls the various systems and equipment that generates and delivers electricity. They began evaluating security software, seeking solutions they could package with their own offerings.
解决方案
After evaluating several security options, CCS chose BeyondTrust’s PowerBroker Endpoint Protection solution. Although PBEPP is designed as an Integrated Threat Management solution, with a suite of features that includes antivirus, endpoint protection, vulnerability scanning and more, CCS wanted something more basic: host-based intrusion protection (HIPS). BeyondTrust worked with CCS to package this part of PBEPP with CCS’s energy sector computing solution. PBEPP leverages an intrusion prevention engine that dynamically collects and incorporates new threat data in real time. PBEPP HIPS protects systems regardless of whether or not an attack has been identified and a signature or patch deployed against it. PBEPP blocks zero-day attacks that bypass traditional signature-based solutions, eliminating the need for specific attack signatures. Since the product was launched in 2004, it has successfully thwarted 100% of remote intrusion attempts.
运营影响
  • PBEPP HIPS protects systems regardless of whether or not an attack has been identified and a signature or patch deployed against it.
  • PBEPP blocks zero-day attacks that bypass traditional signature-based solutions, eliminating the need for specific attack signatures.
  • Since the product was launched in 2004, it has successfully thwarted 100% of remote intrusion attempts.
数量效益
  • Since the product was launched in 2004, it has successfully thwarted 100% of remote intrusion attempts.

相关案例.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.