SlideShare a Scribd company logo
1 of 4
Download to read offline
EXECUTIVE OVERVIEW
Protect Production
and Intellectual Property
UNISYS STEALTH ACCELERATES TIME-TO-MARKET
WITHOUT SACRIFICING SAFETY AND SECURITY
Executive Overview2
Zero Incidents:
Your Goal. Our Mission.
Today, most automated manufacturing process
systems are connected to business networks.
As a result, modern industrial automation controls
and human-machine interfaces (HMIs) run on the
same hardware and software as their business
networks, such as Intel processors and Microsoft
Windows or Linux operating systems. Because of
the interconnected world of modern manufacturing,
industrial controls are subject to malicious code that
can propagate throughout the entire manufacturing
execution system (MES) and machine to machine
(M2M) environment. According to a report in
Engineering and Technology, “Key information
regarding vulnerabilities in Industrial Control Systems
(ICS) and Supervisory Control and Data Acquisition
(SCADA) systems is now openly available from a
range of sources on the public Internet.”1
In addition, legacy control systems, never meant
to interface or be exposed to common IP-based
networks, may be especially vulnerable as they
were not designed to operate in such a highly
1
	Hayes, Jim. Critical infrastructure hack data found in public domain.
Engineering and Technology Magazine, January 28, 2014.
interconnected environment. Manufacturers must pro-
tect both types of controls: “black box” legacy controls
and more modern, microprocessor-based systems.2
How can manufacturers protect their critical process
controls and enterprise assets from advanced
persistent threats (APT) and other sophisticated
cyber threats while also accelerating time-to-market
and reducing costs? With Unisys Stealth™, you can:
Go invisible. Make servers, devices, and other
endpoints dark and undetectable to hackers and
unauthorized users inside and outside your enterprise.
Isolate segments of your data center based
on user identity. Define and control access to
mission-critical systems and information based
on need-to-know access.
Secure data-in-motion. Protect data with
point-to-point encryption.
Consolidate. Reduce reliance on physical
IT infrastructure.
Scale and adapt. Upgrade legacy systems, easily
meet emerging needs and compliance requirements
with agile, software-based security.
2
	Pinto, Jim. Automation & IT systems are different. Automation.com
http://www.automation.com/library/articles-white-papers/articles-by-jim-
pinto/automation-systems-cyber-security
Keep Critical Infrastructure Secure
Executive Overview3
STEALTH COMMUNITIES OF INTEREST
Stop Cyber Assaults
Before They Happen
Unisys Stealth takes a radically different approach
to addressing security threats by making endpoints
such as SCADA/ICS and PLCs on HMI and M2M
networks invisible to unauthorized users and by
securing data-in-motion across any network.
This is how Stealth can help industrial organizations
Get to Zero Incidents.
By creating highly-trusted communities of interest
(COI), Stealth is designed to allow only authorized
users to access devices, applications, and systems
critical to manufacturing system infrastructure.
Intellectual property can be protected from theft,
and production lines and systems can be secure.
In addition to strengthening mission-critical protection,
manufacturing organizations can reduce infrastructure
costs by safely modernizing their industrial controls
and software with one unified security solution. And
as regulatory mandates change, Stealth can deliver
the agility enterprises need without requiring costly
upgrades or extensive reconfiguration.
Why Stealth Now?
Unisys Stealth is the innovative, mission-critical
security that industrial manufacturing organizations
need to help improve safety and secure their supply:
No operational disruption. Stealth works with existing
firewall, intrusion detection, and other security
systems with easy installation so you can upgrade
your systems without compromising security.
Reduces risk. Make network-operated ICS/SCADA
devices invisible. Isolate critical systems from the
rest of the enterprise. Tighten access control based
on user identity.
Facilitates compliance. Stealth can help achieve
compliance with the Executive Order on Improving
Critical Infrastructure Cybersecurity, and other
regulatory requirements and recommendations.
Reduces costs. Protect enterprise customer data,
accounting, production, and ICS/SCADA with one
cost-effective security solution—Stealth can cover
both business and supply processes.
Improves agility. Stealth allows for quick, easy
changes to accommodate rapidly evolving regulatory
requirements or mission/business needs.
You Can’t Hack What You Can’t See
STEALTH COMMUNITIES OF INTEREST
NETWORK COMMAND
& CONTROL CENTER
Go Invisible.
You control who can
access—or even see—
SCADA/ICS, command
and control systems, and
other endpoints.
TRUSTED
USER
(COI)
TRUSTED
USER
(COI)
UNAUTHORIZED
USER
x
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo
are registered trademarks or trademarks of Unisys Corporation. All other brands and products
referenced herein are acknowledged to be trademarks or registered trademarks of their
respective holders.
Stealth is What
Innovative Security
Looks Like
When it comes to critical infrastructure, there
can be no compromise. Stealth can help move
your organization from vulnerable to mission-
critically secure. But don’t take our word for it.
Read Network World’s May 2014 independent
review of Stealth and see why Stealth might
just be “a great way to hide from hackers.”
www.unisys.com/gettozero
Protect What Matters Most
Contact us:
Eastern Region:
Paul Armstrong, 310-944-0833
paul.armstrong@unisys.com
Central Region:
Steve Walston, 972.629.4270
steve.walston@unisys.com
Western Region:
Loren Barnett, 303.518.5102
loren.barnett@unisys.com
Federal:
Sandy Holland, 703.447.4490
sandra.holland@unisys.com
TOLA:
Kim Henry, 469.939.0889
Kimberly.henry@unisys.com
Business Development:
Karen Walsh, 304.579.0391
karen.walsh@unisys.com
Lari Young, 703.507.3401
lari.young@unisys.com
Canada:
Beverly Golchuk, 416.770.0662
beverly.golchuk@unisys.com
UK:
Simon Totterdell, +44 787.299.4090
simon.totterdell@unisys.com
www.unisys.com/stealth

More Related Content

Recently uploaded

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Recently uploaded (20)

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Get to zero stealth industrial manufacturing_executive_overview_ch

  • 1. EXECUTIVE OVERVIEW Protect Production and Intellectual Property UNISYS STEALTH ACCELERATES TIME-TO-MARKET WITHOUT SACRIFICING SAFETY AND SECURITY
  • 2. Executive Overview2 Zero Incidents: Your Goal. Our Mission. Today, most automated manufacturing process systems are connected to business networks. As a result, modern industrial automation controls and human-machine interfaces (HMIs) run on the same hardware and software as their business networks, such as Intel processors and Microsoft Windows or Linux operating systems. Because of the interconnected world of modern manufacturing, industrial controls are subject to malicious code that can propagate throughout the entire manufacturing execution system (MES) and machine to machine (M2M) environment. According to a report in Engineering and Technology, “Key information regarding vulnerabilities in Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems is now openly available from a range of sources on the public Internet.”1 In addition, legacy control systems, never meant to interface or be exposed to common IP-based networks, may be especially vulnerable as they were not designed to operate in such a highly 1 Hayes, Jim. Critical infrastructure hack data found in public domain. Engineering and Technology Magazine, January 28, 2014. interconnected environment. Manufacturers must pro- tect both types of controls: “black box” legacy controls and more modern, microprocessor-based systems.2 How can manufacturers protect their critical process controls and enterprise assets from advanced persistent threats (APT) and other sophisticated cyber threats while also accelerating time-to-market and reducing costs? With Unisys Stealth™, you can: Go invisible. Make servers, devices, and other endpoints dark and undetectable to hackers and unauthorized users inside and outside your enterprise. Isolate segments of your data center based on user identity. Define and control access to mission-critical systems and information based on need-to-know access. Secure data-in-motion. Protect data with point-to-point encryption. Consolidate. Reduce reliance on physical IT infrastructure. Scale and adapt. Upgrade legacy systems, easily meet emerging needs and compliance requirements with agile, software-based security. 2 Pinto, Jim. Automation & IT systems are different. Automation.com http://www.automation.com/library/articles-white-papers/articles-by-jim- pinto/automation-systems-cyber-security Keep Critical Infrastructure Secure
  • 3. Executive Overview3 STEALTH COMMUNITIES OF INTEREST Stop Cyber Assaults Before They Happen Unisys Stealth takes a radically different approach to addressing security threats by making endpoints such as SCADA/ICS and PLCs on HMI and M2M networks invisible to unauthorized users and by securing data-in-motion across any network. This is how Stealth can help industrial organizations Get to Zero Incidents. By creating highly-trusted communities of interest (COI), Stealth is designed to allow only authorized users to access devices, applications, and systems critical to manufacturing system infrastructure. Intellectual property can be protected from theft, and production lines and systems can be secure. In addition to strengthening mission-critical protection, manufacturing organizations can reduce infrastructure costs by safely modernizing their industrial controls and software with one unified security solution. And as regulatory mandates change, Stealth can deliver the agility enterprises need without requiring costly upgrades or extensive reconfiguration. Why Stealth Now? Unisys Stealth is the innovative, mission-critical security that industrial manufacturing organizations need to help improve safety and secure their supply: No operational disruption. Stealth works with existing firewall, intrusion detection, and other security systems with easy installation so you can upgrade your systems without compromising security. Reduces risk. Make network-operated ICS/SCADA devices invisible. Isolate critical systems from the rest of the enterprise. Tighten access control based on user identity. Facilitates compliance. Stealth can help achieve compliance with the Executive Order on Improving Critical Infrastructure Cybersecurity, and other regulatory requirements and recommendations. Reduces costs. Protect enterprise customer data, accounting, production, and ICS/SCADA with one cost-effective security solution—Stealth can cover both business and supply processes. Improves agility. Stealth allows for quick, easy changes to accommodate rapidly evolving regulatory requirements or mission/business needs. You Can’t Hack What You Can’t See STEALTH COMMUNITIES OF INTEREST NETWORK COMMAND & CONTROL CENTER Go Invisible. You control who can access—or even see— SCADA/ICS, command and control systems, and other endpoints. TRUSTED USER (COI) TRUSTED USER (COI) UNAUTHORIZED USER x
  • 4. © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, Unisys Stealth, Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Stealth is What Innovative Security Looks Like When it comes to critical infrastructure, there can be no compromise. Stealth can help move your organization from vulnerable to mission- critically secure. But don’t take our word for it. Read Network World’s May 2014 independent review of Stealth and see why Stealth might just be “a great way to hide from hackers.” www.unisys.com/gettozero Protect What Matters Most Contact us: Eastern Region: Paul Armstrong, 310-944-0833 paul.armstrong@unisys.com Central Region: Steve Walston, 972.629.4270 steve.walston@unisys.com Western Region: Loren Barnett, 303.518.5102 loren.barnett@unisys.com Federal: Sandy Holland, 703.447.4490 sandra.holland@unisys.com TOLA: Kim Henry, 469.939.0889 Kimberly.henry@unisys.com Business Development: Karen Walsh, 304.579.0391 karen.walsh@unisys.com Lari Young, 703.507.3401 lari.young@unisys.com Canada: Beverly Golchuk, 416.770.0662 beverly.golchuk@unisys.com UK: Simon Totterdell, +44 787.299.4090 simon.totterdell@unisys.com www.unisys.com/stealth