[June 07, 2016] |
|
CyberArk Delivers Malware Protection for Industrial Control Systems
Infosecurity Europe 2016 - Stand D140 - CyberArk
(NASDAQ: CYBR),
the company that protects organizations from cyber
attacks that have made their way inside the network perimeter, today
announced new cyber security capabilities for industrial
control systems (ICS) to limit the progression of malware, better
identify privileged account-related risks, and improve remote access
security in industrial environments.
This Smart News Release features multimedia. View the full release here:
http://www.businesswire.com/news/home/20160607005340/en/
What You Need to Know About Cyber Threats to Industrial Control Systems (Photo: Business Wire)
Organizations in manufacturing and pharmaceutical sectors, as well as
those providing critical infrastructure like energy and water utilities,
benefit from new CyberArk
Privileged Account Security Solution capabilities to proactively
protect their ICS assets. CyberArk detects and contains cyber threats
that could lead to downtime or put consumer safety at risk.
Industrial organizations face greater cyber security challenges today as
traditionally air-gapped or segmented operational technology (OT)
networks become increasingly connected to IT systems and the internet,
exposing critical ICS endpoints and other assets to aggressive threats
like ransomware. According to a cyber
security study of UK C-level board members, utilities is one of the
sectors most exposed to cyber security risk when compared to other key
sectors of the economy.
Protect Against Malware and Ransomware Attacks Aggressive
malware attacks targeting ICS have been a common denominator in several
recent attacks in the energy and utilities sector, including the
much-publicized power
outage in the Ukraine and the attack on the Gundremmingen nuclear
power plant in Germany. In other cases, highly threatening malware in
the form of ransomware has impacted facilities like the Lansing Board of
Water & Light (BWL), a Michigan municipal utility in the United States.
Of significant concern is the rise of ransomware
attacks in the industrial space. According to a report from The
Institute for Critical Infrastructure Technology (ICIT)1, "if
a SCADA or ICS system in an energy, utilities or manufacturing
organization becomes infected with ransomware, then lives could be
jeopardized in the time it takes to investigate the incident and return
the systems to operation." The report continues, "without an adequate
investment in bleeding edge endpoint security solutions, ransomware will
likely cause more significant harm much sooner."
Now also available for ICS assets as part of the CyberArk Privileged
Account Security Solution, CyberArk
Viewfinity can help customers defend against malware and ransomware
attacks by combining least privilege and application control to reduce
the attack surface and block malware progression. CyberArk Viewfinity
can help prevent malware from entering ICS computers such as
Human-Machine Interfaces (HMIs) and other assets where significant
damage can be done. It does this by automating the management of local
adminisrator privileges and controlling applications on critical
endpoints and servers.
According to the U.S. Department of Homeland Security2,
implementing application whitelisting in top-hierarchy control computers
such as HMIs represents one of the most critical steps in securing an
ICS network. To help mitigate the risk of malware-based attacks,
CyberArk Viewfinity enables organizations to control and whitelist
applications as well as remove local administrator rights from HMIs; it
seamlessly elevates privileges based on an organization's policy, as
required by trusted (whitelisted) applications.
Advancing Cyber Security in Industrial Environments CyberArk
delivers privileged account protection for ICS by addressing the
vulnerabilities originating from the connectivity between ICS, the IT
environments, the internet and remote users. CyberArk helps customers in
key ICS cyber security areas such as:
-
Secure and Monitor Remote Access - In OT, supply chain
management includes the oversight of users, both internal and external
to the organization, who require access to ICS networks. This access
often involves remote connectivity sessions that can sometimes go
unsecured and unmonitored for days or weeks. Updates to the CyberArk Privileged
Session Manager v9.7 enhance usability across Unix and Windows
environments. CyberArk Privileged Session Manager enables
organizations to secure sessions between a remote user and the ICS
targets, while allowing these sessions to be monitored and recorded.
It also helps block the spread of desktop malware and mitigates the
risk of credential theft.
-
Identify Suspicious Activity - Unusual user activity or
unauthorized credential use to access the ICS assets could be signs of
an in-progress attack. CyberArk Privileged
Threat Analytics v3.1 learns typical patterns of activity and
continuously monitors privileged user and account activity and can
identify and alert on suspicious activity. The alerts can be used by
IT, OT and security teams to help detect, automatically respond and
disrupt in-progress attacks, dramatically reducing any damage to
operations and the business.
-
Quantify the Risk and Reduce the Attack Surface - The
first step in mitigating the risk of compromised credentials is for an
organization to identify all users, applications and associated
credentials used for granting access into the ICS. CyberArk Discovery
and Audit is designed to find privileged user and application
accounts and credentials. The tool generates a full report of scanned
assets that includes a list of accounts and associated credentials as
well as account status related to the company's security policy.
"In a world where a manufacturing line could be tampered with to impact
the integrity of an automobile's windshield or the efficacy of a drug,
or an attack that could bring transportation systems to a halt, the
implementation of risk-based cyber security programs must accelerate,"
said Roy Adar, senior vice president, product management, CyberArk.
"IT/OT convergence and related cyber security risks can threaten uptime
and consumer safety. Nearly all users in ICS environments require some
level of privileged access and are therefore being targeted. Protecting
ICS users and managing those risks should more closely mirror IT
privileged account security best practices."
Additional Resources
-
Infographic - What You Need to Know About Cyber Threats to
Industrial Control Systems http://goo.gl/Su177K
-
Video - CyberArk Brief: How to Address Common Security Risks in
Industrial Control Systems (ICS) https://goo.gl/k5EBQF
-
White Paper (News - Alert) - How CyberArk Can Help Mitigate Security
Vulnerabilities in Industrial Control Systems http://goo.gl/2m7LNn
-
White Paper - NIST 800-82 Revision 2: Guide to Industrial
Control Systems (ICS) Security http://goo.gl/wctCyx
-
White Paper - Protecting the Grid: Addressing NERC (News - Alert) CIP v5
Requirements for Securing Privileged Accounts http://goo.gl/g86NZ0
-
Security Brief - Securing Remote Vendor Access with Privileged
Account Security http://goo.gl/JWbKPu
On July 27, 2016 at 2:00 p.m. EDT, CyberArk will host a webinar
entitled, "Security Analysis Debrief of the Ukraine Power Grid Attack."
To register, visit http://goo.gl/Dy42mQ.
To learn more about CyberArk Industrial Control Systems Security, visit http://www.CyberArk.com/ICS.
1- The Institute for Critical Infrastructure (ICIT), "Combatting the
Ransomware Blitzkrieg: The Only Defense is a Layered Defense, Layer One:
Endpoint Security," April 2016 2- Department of Homeland Security -
ICS-CERT, "Seven Steps to Effectively Defend Industrial Control
Systems," December 2015
About CyberArk CyberArk is
the only security company focused on eliminating the most advanced cyber
threats; those that use insider privileges to attack the heart of the
enterprise. Dedicated to stopping attacks before they stop business,
CyberArk proactively secures against cyber threats before attacks can
escalate and do irreparable damage. The company is trusted by the
world's leading companies - including more than 40 percent of the
Fortune 100 - to protect their highest value information assets,
infrastructure and applications. A global company, CyberArk is
headquartered in Petach Tikvah, Israel, with U.S. headquarters located
in Newton, Mass. The company also has offices throughout EMEA and Asia
Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com,
read the company blog, http://www.cyberark.com/blog/,
follow on Twitter (News - Alert) @CyberArk or
Facebook (News - Alert) at https://www.facebook.com/CyberArk.
Forward-Looking Statements This release may contain
forward-looking statements, which express the current beliefs and
expectations of CyberArk's (the "Company") management. In some cases,
forward-looking statements may be identified by terminology such as
"believe," "may," "estimate," "continue," "anticipate," "intend,"
"should," "plan," "expect," "predict," "potential" or the negative of
these terms or other similar expressions. Such statements involve a
number of known and unknown risks and uncertainties that could cause the
Company's future results, performance or achievements to differ
significantly from the results, performance or achievements expressed or
implied by such forward-looking statements. Important factors that could
cause or contribute to such differences include risks relating to:
changes in the rapidly evolving cyber threat landscape; failure to
effectively manage growth; near-term declines in the Company's operating
and net profit margins and its revenue growth rate; real or perceived
shortcomings, defects or vulnerabilities in the Company's solutions or
internal network system, or the failure of the Company's customers or
channel partners to correctly implement the Company's solutions;
fluctuations in quarterly results of operations; the inability to
acquire new customers or sell additional products and services to
existing customers; competition from IT security vendors; the Company's
ability to successfully integrate recent and or future acquisitions; and
other factors discussed under the heading "Risk Factors" in the
Company's most recent annual report on Form 20-F filed with the
Securities and Exchange Commission. Forward-looking statements in this
release are made pursuant to the safe harbor provisions contained in the
Private Securities Litigation Reform Act of 1995. These forward-looking
statements are made only as of the date hereof, and the Company
undertakes no obligation to update or revise the forward-looking
statements, whether as a result of new information, future events or
otherwise.
Copyright © 2016 CyberArk Software. All Rights Reserved. All
other brand names, product names, or trademarks belong to their
respective holders.
View source version on businesswire.com: http://www.businesswire.com/news/home/20160607005340/en/
[ Back To TMCnet.com's Homepage ]
|