Date

By Source

  • Blog (3)

By Topic

By Features

  • Anti Malware (1)

By Technology

By Services

By Audience

By Language

  • English (12)
  • Industrial Control Systems
Displaying 1 to 26 of 26

Use Case: Consolidate Network Security, Reduce Costs and Complexity

Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.

  • 1
  • 10

Use Case: Secure the Network through Application Visibility

Reduce enterprise cybersecurity risk to business-critical applications and sensitive data with enterprise-wide application visibility, enforcement and whitelisting.

  • 1
  • 77

Murrumbidgee Irrigation

The importance of protecting SCADA systems has never been greater than is the case today. With SCADA systems scattered across its vast irrigation infrastructure, Murrumbidgee Irrigation lives this challenge every day. When security penetration testing pinpointed potential security deficiencies, Murrumbidgee Irrigation embarked on an initiative to transform its security network architecture. After comparing different solutions and testing many of them, Murrumbidgee Irrigation chose Palo Alto Networks® Next-Generation Security Platform. In addition to providing the company’s small ICT team with a single point of contact for multiple areas of its security environment, the platform enabled Murrumbidgee Irrigation to move from a largely reactive security posture to one that is predictive.

  • 0
  • 209

Traps for SCADA

Learn why Palo Alto Networks Traps is ideal for securing SCADA/ICS environments providing superior protection with minimal disruptions.

  • 3
  • 1899

PAN-OS 8.0: Protecting Industrial Automation and Control Systems by Securing the Network

Protect industrial automation and control systems by securing the network with PAN-OS 8.0.

Lionel Jacobs,
  • 0
  • 30

Next-Generation Security Platform for Critical Infrastructure

In this white paper, learn how implementing an Enterprise Security Platform will help SCADA and ICS operations solve some of their challenges.

  • 3
  • 2604

Electric Transmission Data Networks Use Case White Paper

This use case provides a high-level reference design for network security in electric transmission data networks.

  • 0
  • 286

App-IDs for Industrial Control Systems and SCADA Networks

View a listing of the application identifiers, or App-IDs, supported by the Palo Alto Networks Next-Generation Firewall for Industrial Control Systems (ICS).

  • 0
  • 513

Cyber Range

To keep network and security professionals’ security acumen fresh, Palo Alto Networks and Cyber Test Systems present a professional mobile Cyber Range suite.

  • 0
  • 396

Applying VLAN Insertion in ICS/SCADA

Case studies on the Target® and recent Ukraine electrical grid attacks indicate that these attacks were containable or preventable with proper network segmentation.

  • 0
  • 285

ICS / SCADA Use Case: Windows-based Endpoint Security

How do operators/owners of ICS/SCADA systems prevent targeted and zero-day attacks from exploiting software vulnerabilities within their ICS and SCADA networks?

  • 0
  • 197

Warren Rogers Associates

As an industry leader in retail fuel monitoring and diagnostics, Warren Rogers Associates (Warren Rogers) manages thousands of data collection devices installed at service stations across the U.S. Because these devices reside alongside its customers’ business systems that handle credit and debit card data, Warren Rogers had to guarantee it would prevent cardholder data from being collected to ensure PCI DSS compliance.

  • 1
  • 1660

CAME Group

CAME Group (CAME) provides automation systems for residential and industrial entrances, parking lots, and access control points. With 50 branches in 40 countries all networked with its corporate headquarters in Italy, CAME was uniquely challenged to provide a network architecture that ensured both secure network access and secure endpoints. Targeted attacks by malware, such as CryptoLocker, were frequently infiltrating servers and PCs, disrupting productivity and creating unpredictable remediation costs. Traditional antivirus software was ineffective in stopping such attacks. By deploying the Palo Alto Networks Next-Generation Security Platform with Next-Generation Firewalls, Threat Intelligence Cloud services, and Advanced Endpoint Protection, CAME successfully prevents cyberthreats from infiltrating endpoint devices and its network. Through consolidation, CAME is saving $2.5 million over three years, with an additional $250,000 in savings by eliminating remediation costs on endpoint devices. Moreover, the company now has uniform security policies enterprise-wide, with increased visibility and control over network traffic for improved bandwidth and application performance.

  • 2
  • 2177

Industrial Control Systems

The Security Reference Blueprint for Industrial Control and SCADA Systems provides a framework in which Owner/Operators can protect these critical systems from compromise, rationalize the scope of compliance, and more, using the core capabilities of Palo Alto Networks next-generation security platform.

  • 0
  • 1177

Endpoint Protection in NERC CIP Environments – Compliance and APT Prevention

Compliance and security are both top-of-mind issues for electric utilities. The NERC CIP standards mandate controls that protect against malware, provide device monitoring, and enable the detection and response to cyber incidents. This webinar will explore the application of one advanced solution to meet both compliance requirements and security objectives.

  • 3
  • 703

Staying Secure When ICS Patching Is Not An Option

In a recent article for Utility Week, Del Rodillas describes a common challenge in securing industrial control systems (ICS) — that they’re highly susceptible to cyberattacks because their software patching and anti-malware update cycles are too infrequent, if they’re happening at all. 

Chad Berndtson,
  • 0
  • 9

Exposing Common Myths Around Cyberthreats to SCADA and ICS

While awareness over the need for improved cybersecurity in SCADA and Industrial Control Systems (ICS) has improved in recent years, several inaccurate and dangerous assumptions about ICS cybersecurity best practices and the nature of cyber threats still persist. If held by organizations as fact, these myths could result in inadequate cyber-defensive measures and a high level of exposure to a range of attacks or even simple accidental cyber incidents both of which could have equally concerning consequences to process availability and safety.

  • 1
  • 256

Defining the 21st Century Cybersecurity Protection Platform for ICS

In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.

  • 2
  • 3788

Join Us for a New Series on Industrial Control Systems Security and IT-OT Integration

Join us on September 24th for the first of three webinars focused on Industrial Control Systems cybersecurity featuring our guest speaker and ICS cybersecurity expert and author, Joe Weiss, who is also Managing Director of ISA 99. Throughout the series, we will have the opportunity to hear both IT and OT perspectives on various topics from risks in ICS, to what’s required for success, as well as some of the best practices and technologies which help to address the unique needs of control systems cybersecurity.

Del Rodillas,
  • 0
  • 2

SCADA and Industrial Control Systems Industry Solution Brief

Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.

  • 1
  • 4419
Displaying 1 to 26 of 26