|By Business Wire||
|January 29, 2013 08:12 AM EST||
McAfee and SUBNET Solutions Inc. (SUBNET) today announced that they have joined together to offer the industry’s first unified substation security solution to address the growing cyber security needs for electric utility substation integration and automation systems. Using a combined solution of the Unified Grid Intelligence products from SUBNET and the Security Connected for Critical Infrastructure framework products from McAfee, a utility operator can now implement an advanced substation integration and automation system that also protects against cyber threats for meeting regulatory requirements such as NERC CIP.
The combined solution includes the SUBNET SubSTATION Server and SUBNET PowerSYSTEM Center with McAfee Enterprise Security Manager, Intrusion Prevention Systems, McAfee Deep Command and McAfee Application Control.
SUBNET SubSTATION Server provides utilities with a true multi-vendor substation gateway solution that is able to interface with all major substation vendors’ intelligent electronic devices (IEDs). Integrating McAfee Application Control and Network Intrusion Prevention with SubSTATION Server creates a comprehensive unified solution that can integrate, automate and secure almost any utilities’ IED-based substations without requiring costly upgrades or replacement of existing substation IEDs. McAfee Network Intrusion Prevention also provides advanced threat prevention designed specifically for substation systems architectures.
The SUBNET PowerSYSTEM Center security solution for centralized IED Access Control and IED Password Management, required for NERC CIP compliance, becomes a comprehensive power system security solution with the combination of McAfee Enterprise Security solutions. McAfee Enterprise Security Manager provides deep security visibility for stronger attack detection and incident response, including threats specific to substation integration and automation systems. Using McAfee Deep Command and McAfee ePolicy Orchestrator software, an asset owner can power on a substation computer to remotely update it out of band, provide patches and security updates.
“Cyber security attacks on industrial automations are real and increasing. According to, In the Dark, Center for Strategic and International Studies (CSIS), February 2011 study, funded by McAfee, 85% of critical infrastructure companies have experienced an intrusion,” said David Hatchell, Director of Industrial Control Systems and Energy at McAfee. “To protect the complexity and diversity of electrical power delivery systems, a strong partnership is necessary between the equipment manufacturer and the security vendor to increase security while ensuring the safety and reliability of the systems. We are pleased to be working with SUBNET to bring an advanced security solution to the substation automation industry.”
This offering is available from SUBNET on its SubSTATION Server Platform. More information is available at the SUBNET booth #2325 at DistribuTECH.
SUBNET Solutions Inc. is an industry leading software solutions provider for electrical utilities. SUBNET focuses on Making Power Grids More Intelligent®. Founded in 1992, SUBNET provides intelligent solutions that securely connect any substation device over any communication network to any business intelligence system. Over 200 utilities worldwide rely on SUBNET software to safely manage and monitor thousands of substations. Visit http://www.SUBNET.com for more information.
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com
Note: McAfee is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.
The Internet of Things (IoT) is about the digitization of physical assets including sensors, devices, machines, gateways, and the network. It creates possibilities for significant value creation and new revenue generating business models via data democratization and ubiquitous analytics across IoT networks. The explosion of data in all forms in IoT requires a more robust and broader lens in order to enable smarter timely actions and better outcomes. Business operations become the key driver of I...
Aug. 28, 2015 12:30 AM EDT Reads: 324
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
Aug. 28, 2015 12:00 AM EDT Reads: 371
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
Aug. 27, 2015 10:00 PM EDT Reads: 346
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
Aug. 27, 2015 06:15 PM EDT Reads: 380
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
Aug. 27, 2015 05:45 PM EDT Reads: 436
As more and more data is generated from a variety of connected devices, the need to get insights from this data and predict future behavior and trends is increasingly essential for businesses. Real-time stream processing is needed in a variety of different industries such as Manufacturing, Oil and Gas, Automobile, Finance, Online Retail, Smart Grids, and Healthcare. Azure Stream Analytics is a fully managed distributed stream computation service that provides low latency, scalable processing of ...
Aug. 27, 2015 05:45 PM EDT
Everyone talks about continuous integration and continuous delivery but those are just two ends of the pipeline. In the middle of DevOps is continuous testing (CT), and many organizations are struggling to implement continuous testing effectively. After all, without continuous testing there is no delivery. And Lab-As-A-Service (LaaS) enhances the CT with dynamic on-demand self-serve test topologies. CT together with LAAS make a powerful combination that perfectly serves complex software developm...
Aug. 27, 2015 04:15 PM EDT
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Aug. 27, 2015 02:45 PM EDT Reads: 377
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Aug. 27, 2015 02:30 PM EDT Reads: 300
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
Aug. 27, 2015 02:15 PM EDT
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
Aug. 27, 2015 02:15 PM EDT Reads: 507
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Aug. 27, 2015 02:00 PM EDT Reads: 302
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
Aug. 27, 2015 02:00 PM EDT Reads: 323
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
Aug. 27, 2015 01:00 PM EDT Reads: 162
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Aug. 27, 2015 01:00 PM EDT Reads: 283