Forcepoint developed a new security system that will meet the challenges posed in the technological structure to the constant threats.
Forcepoint, the world leader in cyber security, announced the creation of a new business unit to meet specifically the security challenges facing critical infrastructure vendors in today’s sophisticated threat landscape. Forcepoint’s new critical infrastructure Unit will leverage the full set of capabilities of the company’s division of global governments and corporate security to provide cyber security products — at the level of U.S. Department of Defense – for internal threat detection, data security improvements, and advanced protection against critical infrastructure threats. Initially, the company will focus its efforts on organizations that use Industrial Control systems (SCI), such as energy, oil, gas and critical-level manufacturing.
Leveraging its 20 years of experience and securing high-security environments, today Forcepoint is the only company that can respond to threats to critical infrastructure at its most vulnerable: the human factor of interaction with systems and data. The company will offer a portfolio of integrated cyber security products based on human behavior and enriched with relevant content for the industrial space. It will initially focus on network security solutions designed to provide more visibility to the sophisticated threats faced by industrial control systems.
Connecting operational technology (to) such as industrial control systems (SCI) and monitoring and data acquisition control systems (SCADA) to the IT network can offer new levels of functionality, cost savings and transparency to leverage the metadata and conclusions of data analytics. Relying on connected devices also exponentially expands the attack zone of the to environment within the critical infrastructure. The combination of sophisticated intruders who understand how to alter a physical process with a frequency of attacks targeting users with accredited access to confidential information exacerbate the challenges facing the information security directors and Industrial plant operators to define the ownership of these areas. According to Gartner1, “in 2021, 70 percent of the security of to will be administered directly by the departments of the Director of information, Director of information security or director of security, compared to the current 35 percent.”
“The relative ease and low cost of cyber attacks that now cross borders may result in a critical infrastructure crisis, where both the information technology and the operational aspect of the company have to join and collaborate Quickly, “said Sean Berg, senior vice president and general manager of Forcepoint’s global governments and critical infrastructure division. “These industries provide essential services that support society, and they need to control access to the power plant or the grid to protect their users and critical data. The most effective and holistic approach requires a behavioral view to automatically provide security countermeasures to prevent intrusion into critical systems that do not affect availability. ”
Choice of network segmentation options to protect industrial environments
Forcepoint’s critical infrastructure solutions are based on decades of company experience in providing security solutions that protect networks Sensitive government and secure connectivity between these networks and the Internet. These solutions will be tailored to meet the content requirements of industrial environments, providing secure segmentation to meet operational needs, such as vendor partners that require remote access, and a baseline to monitor threats in industrial environments. Forcepoint’s solution enables critical infrastructure operators to rely on firewall security or secure unidirectional data transfer to more sensitive areas, while ensuring compliance with standards such as NERC-CIP, NEI-08-09 and ISA/IEC 62443.
Forcepoint NGFW provides security, performance, and consistent operations in physical, virtual, and cloud systems. It is designed for the three stages of network defense — to defeat Evasions, detect vulnerabilities, and stop malware. Provides fast traffic decryption, including HTTPS web connections, along with granular privacy controls that keep organizations and users safe in a constantly changing world.
Forcepoint Data Guard can validate all data transfers in the application and in the data layers, allowing only the execution of valid commands and data sets necessary for the operation of the systems.