Network segmentation is a critical, fundamental building block in today’s modern process controls networks (PCN). Once thought to be an optional practice, the recent increase in attacks on ICS/SCADA systems shows it is vital to network design and security implementation. Case studies on both the Target® and the more recent Ukraine electrical grid attacks indicate that these attacks were containable – even preventable – had the proper network segmentation been in place.
This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Cortex Data Lake, and IoT Security Service.
Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk.
When Prologis needed to accelerate their move into the cloud, they turned to RedLock – Palo Alto Networks API-based security and compliance service – to do so securely. In this video, Tyler Warren, Senior Cloud Security Architect, discusses the value the organization has experienced as a result of deployment. RedLock has been critical for day-to-day business operations at Prologis, both as an IT and SecOps tool.
The importance of protecting SCADA systems has never been greater than is the case today. With SCADA systems scattered
across its vast irrigation infrastructure, Murrumbidgee Irrigation lives this challenge every day. When security penetration testing pinpointed potential security deficiencies, Murrumbidgee Irrigation embarked on an initiative to transform its security network architecture.
After comparing different solutions and testing many of them, Murrumbidgee Irrigation chose Palo Alto Networks® Next-Generation Security Platform. In addition to providing
the company’s small ICT team with a single point of contact for multiple areas of its security environment, the platform enabled Murrumbidgee Irrigation to move from a largely reactive security posture to one that is predictive.