//
you're reading...
IT & TECHNOLOGY, Palo Alto Networks

Endpoint Protection for SCADA and ICS Environments? Traps Has Your Back


Information technology (IT) administrators have been quick to adopt new security solutions, but operational technology (OT) administrators are forced to proceed cautiously, in order to prevent compromising process performance or unwanted downtime. These concerns can result in deliberately leaving software unpatched, antivirus (AV) signatures outdated, technologies disjointed, or security solutions left out entirely.

Even organizations that can successfully deploy fully updated antivirus solutions on fully patched systems still find themselves struggling to prevent advanced attacks. The lack of protection against new attacks, impacted system performance, and high rates of false positives leave these organizations vulnerable, often to sophisticated, never-before-seen attacks.

Organizations can no longer rely on fragmented legacy solutions or point solutions to defend critical infrastructure. The result is a dire need for improved security in ICS/SCADA environments – security that can prevent advanced attacks effectively without impacting system performance and can communicate across the environment.

Palo Alto Networks Traps advanced endpoint protection combines multiple layers of prevention to protect endpoints before they are compromised.

  • Traps integration with WildFire cloud-based threat analysis service allows for automated prevention against known malware; local analysis via machine learning enables the automatic prevention of unknown malware and prevents a wide variety of exploit techniques, whether a machine is offline or online, on-premise or off; and cloud-based threat analytics permits rapid detection and automated prevention of unknown threats.
  • With trusted publisher execution restrictions, executables that are signed by trusted publishers are quickly identified as “unknown good.”
  • Flexibility to customize systems exposure with policies that restrict specific execution scenarios can control what is or is not allowed to run based on the executable files hash, eliminating unnecessary analysis and minimizing the security footprint.
  • Malicious process control prevents the launch of applications that can be used for malicious purposes.

As part of the Palo Alto Networks Next-Generation Security Platform, Traps enables bi-directional information-sharing to deliver consistent protections across the organization’s endpoints, data centers, firewalls, public and private clouds and SaaS environments.

Learn More about Traps advanced endpoint protection:

[Palo Alto Networks Research Center]

About @PhilipHungCao

@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Discussion

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Web Stats

  • 121,046 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,357 other followers

Twitter Updates

Archives

April 2017
M T W T F S S
« Mar   May »
 12
3456789
10111213141516
17181920212223
24252627282930
%d bloggers like this: