Security for Industrial Control Systems (ICS)
Over a billion IoT devices protected
As the connectivity of Industry 4.0 drives tremendous progress for manufacturing, process control, infrastructure, and countless other Industrial Control Systems (ICS), threats targeting these systems are on the rise. Increased system connectivity comes with increased risk, but Symantec security solutions help you protect your factories, refineries, and infrastructure by embedding security directly into your industrial equipment, and helping you better monitor industrial networks for such threats. Symantec has both solutions for operators looking to secure their plants and infrastructure, as well as solutions for equipment vendors looking to increase the security of their products.
Proven Technology, Adapted for ICS
Protect your ICS with solutions from the world’s most comprehensive portfolio of security technologies–technologies that protect a billion devices and trillions of dollars. Detect advanced threats with analytics technologies designed for networks that depend on proprietary industrial protocols. Secure industrial equipment with specifically designed embedded solutions.
- 10 trillion security events analyzed annually
- Certificate Authority for over a billion IoT devices
- Unmatched threat protection technologies
Increasingly Serious Threats
ICS attacks are serious and consequential. A steel mill in Germany suffered blast furnace damage. Power grids in Ukraine crashed. And ICS attacks are on the rise. In 2014, there were 245 attacks in the U.S. alone. With roughly one third of ICS operators reporting attacks, the question is not “if”, but “when."
Protect Your Network
Industrial Control System (ICS) security analytics
To detect advanced threats in your network, you need to understand your network. However, deciphering the complexities of legacy ICS networks is a continuous challenge. Leverage Symantec analytics technologies and machine learning to model and understand your ICS network, and become aware of anomalies that merit investigation.
Protect Your Equipment
Symantec Critical System Protection
Use the same proven technology already protecting countless daily financial transactions. Our embedded solutions are variations on the security that protects ATMs, and our back-end solutions derive from those that protect the systems of the world’s largest financial providers. The result is financial-level security for ICS.
The solutions include a range of embedded and Real Time Operating Systems (RTOS) common among ICS equipment vendors. Symantec Critical System Protection (SCSP) can help protect your equipment against increasingly sophisticated attacks. Large operators have successfully required their equipment vendors to embed SCSP. As “policy based” protection, SCSP does not need security content updates such as antivirus updates.
Secure Your Network
Simpler encryption key management for ICS protocols
With world-leading key management infrastructure you can:
- Leverage authentication to prevent unauthorized access
- Safely and effectively restrict access
- Block rogue devices
- Never trust unauthenticated connections
- Never trust unauthenticated data
- Tunnel vulnerable proprietary protocols over mutually authenticated connections with RSA, ECC, SSL, or TLS encryption.
Symantec Critical System Protection (SCSP)
Protect Your Devices, Deliver Superior Security
Symantec Critical System Protection is built on proven technology already protecting countless financial transactions daily in core back-end systems of the world’s largest providers of financial services and is “embedded” in countless ATMs. We’ve adapted this proven, fundamental protection for ICS systems, including a range of embedded and Real Time Operating Systems (RTOS). SCSP can help protect the equipment you make against increasingly sophisticated attacks. SCSP can run with or without customers operating on-premise management servers. As “policy based” protection, SCSP does not need security content updates such as antivirus updates.
Authenticate Your Devices
1 billion Internet of Things (IoT) devices. Hundreds of IoT manufacturers. Trillions of dollars in financial transactions. That’s how Symantec’s key management infrastructure scales.
Our solutions cover everything from consumer goods and smart meters to cellular base stations and aviation systems. We’ve worked with partners on in-factory key injection as well as on real-time notarization of keys generated in-device or in-factory.
- Protect “device to cloud” links with scalable key management
- Enable secure communications among your devices
- Make different vendors in big ecosystems interoperable.
Control your Devices with Signed Code
Never trust unsigned code. Never allow your devices to run unsigned code. Ensure compliance and simplify key management for code signing with Symantec Code Signing Certificates, or utilize cloud-based “code signing as a service” Secure Application Service.
Symantec Secures More Than a Billion Internet of Things (IoT) DevicesSymantec expands security portfolio with Embedded Protection to defend IoT devices against zero-day attacks, already protecting critical infrastructure.
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) received and responded to 245 incidents in 2014.