See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

Customer Story: Lines Company

New Zealand utility bolsters security posture, cost savings and productivity gains with Palo Alto Networks
See more

Reference Architecture for OT and IoT Device Security in Industrial Control Systems

This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Cortex Data Lake, and IoT Security Service.
See more
Displaying 1 - 30 of 38
  • 1
  • 2

White Paper

Electric Transmission Data Networks Use Case White Paper

Read this use case white paper based on real world designs to learn: How to better secure your Electric Transmission Data Networks from advanced cyberthreats How to more efficiently and comprehensively address your NERC CIP compliance obligations
February 19, 2021

White Paper

Secure Remote Access for OT and IIoT with Prisma Access

Enterprise networks are undergoing a tremendous transformation in response to the digital revolution. Global expansion, mobile workforces, work-from-home, and cloud computing are shifting the location of work-related applications, data, users, and even control system operations. These changes introduce new opportunities not just for traditional enterprise systems but for operational technologies as well; creating a set of cybersecurity risks that must be addressed by two different points of concern and reference.
December 9, 2020

Other

APP-IDs for ICS and SCADA

Learn about our existing application identifiers for ICS & SCADA networks, how you can develop your own using custom App-ID decoders, and how you can submit a request for new App-IDs.
December 3, 2020

White Paper

Reference Blueprint Architecture for Electric Grid Substations

In this whitepaper, we will look at the growing concerns the Digital Transformation beings with it and how to address these concerns using the Palo Alto Networks next-generation firewalls.
November 24, 2020

White Paper

Security Reference Blueprint for Mining Industrial Control Systems

How to build security into your ICS and SCADA networks
October 29, 2020

White Paper

Remote Access for ICS and SCADA PDF

White paper discussing how remote access can be supplied to both greenfield or brownfield deployments into an automation network.
August 24, 2020

Article

Security Reference Blueprint for Industrial Control Systems White Paper

The Security Reference Blueprint for Industrial Control and SCADA Systems provides an IT-OT security framework in which owners and operators can protect these critical systems from compromise, rationalize the scope of compliance and more, using the core capabilities of Palo Alto Networks® Security Operating Platform.
August 3, 2020

White Paper

Applying VLAN Insertion in ICS/SCADA

Network segmentation is a critical, fundamental building block in today’s modern process controls networks (PCN). Once thought to be an optional practice, the recent increase in attacks on ICS/SCADA systems shows it is vital to network design and security implementation. Case studies on both the Target® and the more recent Ukraine electrical grid attacks indicate that these attacks were containable – even preventable – had the proper network segmentation been in place.
July 29, 2020

Infographic

Which Cloud Defender Are You?

Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.
June 29, 2020

Other

Reference Architecture for OT and IoT Device Security in Industrial Control Systems

This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Cortex Data Lake, and IoT Security Service.
June 17, 2020

Use Case

Automating Cyber Operations

To gain, maintain, and expand competitive advantage over adversaries in a new digital operating environment, SOCs must be capable of seamlessly employing, integrating, and automating its capabilities across all environments and in any domain.
April 22, 2020

Webinar

Secure Digital Transformation of OT Webcast

Join this virtual security roundtable to hear from our esteemed panel of cross-sector OT security experts on the important topic of securing industrial control systems during this era of accelerating OT digital transformation.
April 15, 2020

White Paper

How Palo Alto Networks supports the NIST Cybersecurity Framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk.
March 18, 2020

White Paper

21st Century SCADA Security with Mario Chiock (WP)

SCADA and Industrial Control Systems experience unprecedented levels of agility, speed, and cost savings with the adoption of information technology and increased connectivity to supporting networks. However, with this modernization have also come undesired IT vulnerabilities and other threat vectors which are increasingly being exploited by malicious actors. The need for improved security in ICS has never been higher and has become a board-level issue for many organizations. In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
February 10, 2020

White Paper

Enabling Secure Industrial Digital Transformation

This executive-level whitepaper from industrial automation market experts, ARC Advisory Group, covers the challenges industrial asset owner-operators will face as they embark on their OT digital transformation initiatives.
January 9, 2020

Book

BeyondCorp: A Step Towards Zero Trust for the Cloud

This eBook looks at BeyondCorp, how it works, its key principles, and how it applies towards implementing a comprehensive Zero Trust approach in the cloud.
October 18, 2019

Video

Securing Branch Offices with Prisma

Learn how Prisma can help secure your branch offices through cloud-delivered security in this short video.
October 9, 2019

Video

Customer Story: City of Mesa Video

Lester Godsey, City of Mesa discusses his IoT and SCADA multi-phase strategic approach to cybersecurity and how Palo Alto Networks fits into that strategy.
September 23, 2019

White Paper

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
June 5, 2018

White Paper

Cybersecurity Reference Blueprint for Building Management/Automation Systems

This white paper presents a cybersecurity reference blueprint for Building Management/Automations Systems (BMS/BAS)
May 22, 2018

White Paper

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
May 15, 2018

White Paper

USE CASE: Grow and Maintain Cyber Skills With a Cyber Range

Repurpose existing talent, grow, test and maintain cyber skills with a Cyber Range using Palo Alto Networks Next Generation Security platform for your Blue team.
April 10, 2018

Article

State of the Cybersecurity Nation: Legislation and Europe’s Security Professionals

With both the threat landscape evolving rapidly and regulatory requirements becoming more demanding, organisations are struggling to prepare for cybersecurity incidents. .
November 8, 2017

References and Case Studies

Murrumbidgee Irrigation

The importance of protecting SCADA systems has never been greater than is the case today. With SCADA systems scattered across its vast irrigation infrastructure, Murrumbidgee Irrigation lives this challenge every day. When security penetration testing pinpointed potential security deficiencies, Murrumbidgee Irrigation embarked on an initiative to transform its security network architecture. After comparing different solutions and testing many of them, Murrumbidgee Irrigation chose Palo Alto Networks® Next-Generation Security Platform. In addition to providing the company’s small ICT team with a single point of contact for multiple areas of its security environment, the platform enabled Murrumbidgee Irrigation to move from a largely reactive security posture to one that is predictive.
July 13, 2017

White Paper

Traps For ICS/SCADA

This paper provides a deeper look at Traps advanced endpoint protection features, functionality, and technical architecture.
April 12, 2017

References and Case Studies

Customer Story: Lines Company

New Zealand utility bolsters security posture, cost savings and productivity gains with Palo Alto Networks
February 28, 2017

White Paper

Next-Generation Security Platform for Critical Infrastructure

In this white paper, learn how implementing an Enterprise Security Platform will help SCADA and ICS operations solve some of their challenges.
February 7, 2017

Use Case

Protect the Endpoints in ICS/SCADA PDF

Protect the Endpoints in ICS/SCADA PDF
September 8, 2016

Webinar

How to Architect “Zero Trust” Network Segmentation in Industrial Control Systems

CS environments are typically “flat”, designed with a rudimentary security posture never intended to be connected to the corporate network nor the Internet for that matter. The trend towards connectedness persists and this, along with the rising ICS threat landscape has made ICS a prime target for cyberattacks. Stronger access controls are critical for managing the different attack surfaces.
November 17, 2015

In The News

SCADA - Most computer attacks are mishap

April 22, 2015
Displaying 1 - 30 of 38
  • 1
  • 2

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.