MUSE CYBER SECURITY SUITE

Page created by Clinton Ortiz
 
CONTINUE READING
MUSE CYBER SECURITY SUITE
MUSE™
CYBER SECURITY
SUITE

                 COMPREHENSIVE PROTECTION FOR CRITICAL
                          INFRASTRUCTURE

Protecting critical infrastructure from cyber-attacks is a particularly complex challenge. You must defend operational
technologies (OT), and be able to discern tangible threats from a multitude of reported events. ECI’s Muse Cyber Security
Suite meets these challenges head-on.
SHIELD unifies multiple cyber security functions into a consolidated form factor and prevents OT cyber-attacks at any CI
facility, well before they can cause any harm. SHIELD incorporates industry-leading SCADA anomaly detection, a Secure
Gateway, Encryption, and more.
COMPASS is an intelligent, centralized system that eliminates the guesswork when identifying and managing CI cyber security
threats. It collects, validates, correlates, and analyzes information generated by SHIELD, presenting threat insights in a visually
intuitive and actionable manner.

                                   Prevents attacks                  Event correlation                   Low TCO by
 Full OT security                  at facility points                zeroes in on real                combining security
    coverage                           of access                         threats                       with connectivity
MUSE CYBER SECURITY SUITE
UNIQUE CHALLENGES IN PROTECTING
CRITICAL INFRASTRUCTURE
In the past, industrial control systems were isolated from less secure areas, such as corporate networks and the Internet.
Consequently, gapping and physical security measures were sufficient for securing these systems. Eventually, organizations
connected their SCADA networks with other networks in order to cut costs and share operational information. But by
eliminating this separation of systems, the control networks became exposed to hackers.
While traditional security solutions provided some level of protection, these were often deployed in a piecemeal,
uncoordinated fashion with gaps in coverage. Moreover, they overstretched cyber teams, making them deal with all possible
threats and the sheer amount of alerts generated. It became critical to reduce the overwhelming quantity of notifications,
warnings, and false-positive alarms to allow cyber teams to focus on real threats in real-time to prevent breaches and attacks.

MUSE CYBER SECURITY SUITE ARCHITECTURE
Muse addresses these challenges by providing a holistic
cyber security solution for critical infrastructure and
operational networks. It relies on two systems:
Muse COMPASS provides an aggregated view of
calculated threats from the entire cyber security suite.
It delivers threat severity grading, based on correlating
events from multiple security functions, enabling
effective allocation of professional expertise.
Muse SHIELD provides attack mitigation at the
communication points-of-access to CI facilities, and
feeds COMPASS with events, logs, and Deep-Packet-
Inspection (DPI) information. In turn, COMPASS
guides SHIELD policies on how to handle various
patterns and signatures of packet flows.
MUSE CYBER SECURITY SUITE
MUSE COMPASSTM
An intelligent centralized system, COMPASS eliminates the guesswork
in identifying and managing CI cyber security threats. It collects,
validates, correlates, and analyzes information from Muse SHIELD,
presenting threat insights in a visually intuitive and actionable manner.
COMPASS lets your team focus on real threats, in real time, making
better use of your existing headcount.
A simple click on an aggregated alert allows you to analyze events from
multiple security functions. A clean, easy-to-follow multiple-event timeline is displayed, enabling the user to drill down to
discover and pinpoint threat root causes.
COMPASS enables future-proof growth and flexibility, by adding/removing third-party modules and aggregated
components, such as threat databases, open source intelligence, and existing SIEM systems.

MUSE SHIELDTM
Unifying multiple cyber security functions into a consolidated form factor, SHIELD stops OT cyber-attacks at the
communications point-of-access to any CI facility, before they can cause harm. SHIELD provides:

            SCADA ANOMALY DETECTION
Muse SCADA AD automatically discovers the assets across your OT networks and scrutinizes network traffic. It learns the
finite set of connections, conversations, and commands, creating a fine-grain behavioral system baseline that characterizes
legitimate traffic behavior for each asset in the network. Advanced algorithms are then applied to the system baseline to
detect anomalies that may indicate an attack or another problem. These analyses offer important insights about network
hygiene, configuration issues, and vulnerable assets, generating actionable alerts that are clear, consolidated, and
context-rich. The alerts provide security and control teams with rapid situational awareness of potential and actual process
disruptions, enabling them to respond to events and maintain the safety and reliability of industrial processes quickly
and efficiently.

            SECURE GATEWAY
The multilayer protection Secure Gateway suite includes NextGen-Firewall, Application Control, as well as IPS and
Network-Antivirus. The Secure Gateway segregates the different OT LANs. This way, attacks cannot propagate to other
locations in the network and lateral movement is blocked

            ENCRYPTED COMMUNICATIONS
L2/L3 encryption protects data flows between a pair of SHIELDs. It also supports network-level peer authentication, data
origin authentication, data integrity, and data confidentiality (encryption).
MUSE CYBER SECURITY SUITE
COMPREHENSIVE PROTECTION FOR CRITICAL

                                                                                                                                                       Copyright © 2018 ECI. All rights reserved. Information in this document is subject to change without notice. ECI assumes no responsibility for any errors that may appear in this document.
INFRASTRUCTURE
CURRENT CHALLENGES                                                       MUSE CYBER SECURITY VALUE
Separate systems for attack mitigation and threat detection              Muse provides a comprehensive integrated solution for protecting the OT
                                                                         encompassing SHIELD attack mitigation and COMPASS threat detection.
Limited visibility of the operational technology (OT)                    COMPASS provides automatic discovery, presentation, and validation of
                                                                         the network topology of all SCADA devices.
Ensuring system integrity, that all commands and control functions are   COMPASS validates OT network on the assumption that it has been
genuine and correct                                                      breached and that SCADA C&C may be altered by an intruder.
Assessing parallel inputs from multiple security monitoring tools, where COMPASS aggregates threat analysis and consolidates, grades, and
each tool supports a different security function                         presents risks according to their severity and number of independent
                                                                         sources. It reduces false positives and negatives, increasing overall
                                                                         effectiveness.
Long intervals for conducting investigations, due to collection of       COMPASS aggregates, stores, and makes all security information easily
information from multiple security tools and sources                     accessible from a central repository, speeding up threat evaluation and
                                                                         response.
Network connectivity and network security are detached                   SHIELD consolidates connectivity with security, creating a streamlined,
                                                                         low-cost, high-reliability architecture.
Multiple security mitigation functions from multiple vendors             SHIELD consolidates multiple pre-certified best-of-breed security functions
                                                                         on a single form factor, covering SCADA anomaly detection, encryption,
                                                                         and a Secure Gateway.
New cyber security threats drive new security tools on separate          SHIELD is an open cyber security platform, capable of implementing
solutions                                                                additional security functions.

Contact us to discover how Muse™ can secure your critical infrastructure from cyber attacks

                         ABOUT ECI
                         ECI is a global provider of ELASTIC network solutions to CSPs, utilities as well as data center operators. Along
                         with its long-standing, industry-proven packet-optical transport, ECI offers a variety of SDN/NFV applications, end-
                         to-end network management, a comprehensive cyber security solution, and a range of professional services. ECI's
                         ELASTIC solutions ensure open, future-proof, and secure communications. With ECI, customers have the luxury of
                         choosing a network that can be tailor-made to their needs today – while being flexible enough to evolve with the
                         changing needs of tomorrow. For more information, visit us at www.ecitele.com
You can also read