Electrical Utilities
Empowering the Industry that Powers the World
The world relies on electricity and the Power Generation, Transmission, and Distribution industry delivers. As the world's population increases, the demand for energy will see significant growth. With the critical need to transmit electricity to office buildings, factories, residential areas, and the public infrastructures of growing nations, high-performance, reliable products are essential.
The Tofino Security Appliance combines industrial-strength design, flexibility, and innovative cyber-security options to support PT&D providers. It has been designed from the ground up to support compliance with NERC-CIP V5, IEEE-1613, and IEC-61850 standards. It can be installed in a live control network without any pre-configuration and with no facility downtime.
The Tofino Configurator software lets the technician easily define rules that specify which network devices are allowed to communicate and what protocols they may use. Adding the optional Deep Packet Inspection software modules provides detailed protocol filtering to enforce security policy. The Tofino Industrial Security Solution provides a reliable and straightforward solution to secure the Power industry.
Articles
- Canvassing the cyber security landscape: Why energy companies need to pay attention
- Process Automation Systems: How Secure Is Secure Enough?
- Forget the Silos, Build the Bridge
- Cyber Espionage comes to Automation and SCADA
- Cyber Security: Test Your System Five Ways
- Expert: Hackers penetrating control systems
- Digital danger zone: Tackling cyber security
- Cyber Wars
- Safety and Security: Two Sides of the Same Coin
- SCADA Security: New Standards Protecting Old Technology
- The Myth of Obscurity
- Network Security Matures
- Cyber security for pipeline control systems
- SCADA Security Basics: Why are PLCs so Insecure?
- The Line - Defense in Depth Sound Security Strategy
- Insidious threat to control systems
- Cyber Security Risks for Critical Infrastructure
- Industrial Networks Under Attack
- SCADA Security's Air Gap Fairy Tale
- Could Cyber Terrorists Attack Our Company?
- #1 ICS and SCADA Security Myth: Protection by Air Gap
- #1 ICS and SCADA Security Myth: Protection by Air Gap (Newsletter)
- Estimating a System's Mean Time-to-Compromise
- Control Network Secure Connectivity Simplified
- Wireless Ethernet's Black Eye
- Can't Happen at Your Site? Network Security on the Plant Floor
Blog Posts
- Cyber Attacks on U.S. Critical Infrastructure will Intensify
- #1 ICS and SCADA Security Myth: Protection by Air Gap
Videos and Presentations
White Papers
- Comparing Electronic Battlefields: Using Mean Time-to-Compromise as a Comparative Security Metric
- Effective OPC Security for Control Systems
- The Special Needs of SCADA/PCN Firewalls: Architectures and Test Results
- Industrial Cybersecurity For Power System And SCADA Networks
- Finding the Security Holes before the Hackers Do
- On Shaky Ground - A Study of Security Vulnerabilities in Control Protocols
- OPC Security White Paper #3 - Hardening Guidelines for OPC Hosts
- The Myths and Facts behind Cyber Security Risks for Industrial Control Systems
- Designing Secure Networks for Process Control