SCADA & Industrial Control For Critical Infrastructure
Insufficient security and unpatched, highly vulnerable legacy systems combined with a more sophisticated threat landscape targeting critical infrastructure, has made improving cybersecurity in SCADA/ICS networks more important than ever. Asset owners need to control network access, block threats, and reduce the downtime associated with security incidents. Palo Alto Networks unique approach to network traffic control, threat prevention, and central management protects your key infrastructure from cyberthreats and ensures network availability.
IMPLEMENT A LEAST PRIVILEGES ACCESS MODEL BASED ON APPLICATION, USER, AND CONTENT CONTROL
Use our network security platform to segment SCADA/ICS assets into security zones based on risk profiles and security requirements, and then apply our unique application and user identification technologies to gain unprecedented visibility and control of your network traffic. This allows a “least privileges” access model in which only explicitly authorized protocols, applications, and users - whether from within the control network or from external zones (enterprise or remote sites) - can access your control network assets such as historian and OPC servers, HMIs, workstations, and IO controllers (PLCs, IEDs, RTUs).
Palo Alto Networks supports an expansive set of application signatures including SCADA/ICS-specific signatures for Modbus, DNP3, CIP Ethernet/IP, IEC 60870-5-104, OPC, and many others. Function-level control for specific protocols is also available.
PROTECT VULNERABLE SYSTEMS FROM KNOWN AND UNKNOWN THREATS
Cyberattacks can originate from the Internet and from within the control network via portable storage or mobile PCs. Along with appropriate zoning practices and our classification technologies, URL filtering and content blocking can minimize internal and external attack vectors. Native IPS and sandbox analysis tools from Palo Alto Networks can be deployed to block both known and unknown threats trying to infect your systems via these vectors.
Access our Threat Vault to search our library for virus, spyware, and vulnerability signatures including SCADA/ICS-specific signatures.
CENTRAL MANAGEMENT FOR FLEXIBLE IT/OT ADMINISTRATION AND POWERFUL FORENSICS AND REPORTING TOOLS
Our flexible, central management capabilities allow you to easily deploy consistent OT and IT policies and configurations across both your enterprise and control networks.
Furthermore, you can aggregate logs from all sites to a central point to gain holistic insights into your network usage and security incidents. Palo Alto Networks centralized reporting also facilitates documentation for regulatory audits.
AN ARCHITECTURE BUILT FOR PERFORMANCE AND AVAILABILITY
To facilitate real-time performance and availability, our single-pass, parallel processing (SP3) architecture performs application, user, and content classification in a single pass using a highly parallelized computing hardware. Moreover, we separate control plane and data plane processing, and also support redundant architectures to facilitate high availability.
Download a short overview of how our security platform improves critical infrastructure protection.
Ready to learn more? Watch our webinar to learn four powerful strategies for modernizing your control network security to enable better protection of your critical assets and a more effective least privilege access control model.
Are you looking for better application visibility and control in your SCADA/ICS network? Search for supported SCADA/ICS and general networking protocols and applications via our Applipedia database. If you can’t find what you need, Palo Alto Networks can generate the ID for you!
Threat Signatures for SCADA/ICS
Do exploits against your unpatched control system concern you? Log into our Threat Vault to see which vulnerability, anti-virus, and anti-spyware signatures can be used to protect your network.