|By Business Wire||
|February 4, 2014 12:49 PM EST||
RedSeal Networks, the leader in network infrastructure security management, today shared information regarding the highly successful relationship it has developed with customer Pacific Gas and Electric (NYSE: PCG). Since it began playing an integral role in the utility’s comprehensive risk management strategy in 2012, RedSeal Platform has delivered a way for PG&E’s security and network operations teams to effectively understand and visualize all activity across the highly complex network.
PG&E is an investor-owned utility with 5 million business and residential accounts in Northern California. It provides electricity and natural gas to approximately 16 million people, manages natural gas and hydro power plants, and operates a nuclear power plant; its network is the definition of “critical infrastructure.” Like any utility, PG&E had a need to defend its infrastructure from cyber threats because the effects of a cyber-attack on the company could have wide-reaching effects, from a breach of customer information to loss of power.
Headquartered in San Francisco, PG&E has over 1,000 branches across Northern California and its infrastructure is composed of tens of thousands of devices, including 15 load balancers, hundreds of firewalls, more than 1,000 routers and switches, and 50,000 hosts. Its security team protects a complex system that supports 20,000 employees, 5,000 contractors and 5 million business and residential customer accounts. To add to the complexity, the company maintains one network for its business side and a completely separate network to manage operations of the electric grid and power plants, as well as the data generated by millions of smart meters. These networks need to be kept completely separate for security reasons.
The company needed a solution that allowed its security team to visualize both networks on an ongoing basis with limited connectivity between them, monitor for suspicious activity, and quickly understand and isolate risk.
“At PG&E, we are dealing with a very complex network that covers a service territory of over 100,000 square miles,” said James Sample, senior director and CISO, PG&E. “So for us to be able to protect our network and perform computer network defense activities and monitor for vulnerabilities, we needed a better way of understanding our network. In addition, we need to provide that visibility to folks who didn’t design or operate our network, but really need to understand our network topography.”
After a side-by-side evaluation of offerings from several vendors, PG&E selected RedSeal Platform and according to Sample, “RedSeal was our choice hands down for a variety of reasons, including the fact that the technology was far more mature and readily demonstrated that it could do the things we needed the solution to do. Additionally, from day one, the RedSeal Networks team was on the same page with us in terms of strategic thinking about how to integrate this into a larger system.”
RedSeal Platform was selected for its powerful visualization capabilities, flexibility and ease of integration with other tools in use, including the network configuration management and vulnerability management solutions that PG&E already had in place. When a security event happens now, PG&E can understand where on the network it happened, what assets are involved and correlate that with vulnerability data so it knows what additional assets might be at risk.
Critical IT infrastructure in the U.S. and other nations continues to be highly vulnerable to cyber-attacks because the networks are very large and complex, change continuously and are structurally highly porous. In addition, legacy systems such as SCADA systems that were developed decades ago with no security considerations are still in operation. In order to enhance security and protection of such systems, it is necessary to continuously monitor security risk and take remedial actions to minimize the risk on an ongoing basis. To that end, security professionals must understand the state of their network and security architecture, and continuously and automatically check for any changes that impact infrastructure security.
“PG&E is playing a pioneering role in implementing innovative security and risk technologies for Critical Infrastructure Protection of our nation. Under the leadership of James Sample, the utility company is implementing cutting-edge security technologies and we are proud to serve as a critical component of this strategy,” said RedSeal Networks CEO Parveen Jain.
“Our top-down approach to building superior network infrastructure security management technology that addresses the most complex networks such as PG&E’s is a key differentiator as to why our customers achieve significant value when looking to conquer extremely daunting and difficult challenges,” added Jain. “Once you can effectively address the most complex infrastructures, you can clearly demonstrate to others how they can manage their difficult environments. Rarely do you see technologies succeed in achieving the customer’s desired results when it is the other way around.”
Sample said, “RedSeal’s technology has continued to meet our admittedly high expectations, and is playing an integral role as it feeds right into our overall risk management framework to be able to help prioritize and drive future security investment decisions.”
“We encourage RedSeal Networks to continue their forward-thinking ways and to help their customers think through different use cases for their solution,” concluded Sample. “Red Seal Platform’s value to an organization is limitless based on how the end user opts to utilize it.”
About RedSeal Networks
RedSeal Networks is the leading provider of network infrastructure security management solutions that continuously provide network visualization and identify critical attack risk and noncompliance in complex security infrastructure. It provides network, security, and risk management teams with a firm understanding of where security is working, where investment is needed, and where greatest cyber-attack risks lie. This understanding, or "security intelligence", enables organizations to allocate resources where needed most, embed best practice into daily operations, and take prioritized action where needed. The world's largest government and commercial organizations use RedSeal security intelligence to build world-class operations that systematically reduce attack risk over time.
For more information, visit RedSeal at www.redsealnetworks.com.
SYS-CON Events announced today Telecom Reseller has been named “Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Aug. 28, 2016 10:45 AM EDT Reads: 800
As the world moves toward more DevOps and Microservices, application deployment to the cloud ought to become a lot simpler. The Microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. Serverless computing is revolutionizing computing. In his session at 19th Cloud Expo, Raghav...
Aug. 28, 2016 10:30 AM EDT Reads: 859
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Aug. 28, 2016 10:30 AM EDT Reads: 4,012
Enterprises have forever faced challenges surrounding the sharing of their intellectual property. Emerging cloud adoption has made it more compelling for enterprises to digitize their content, making them available over a wide variety of devices across the Internet. In his session at 19th Cloud Expo, Santosh Ahuja, Director of Architecture at Impiger Technologies, will introduce various mechanisms provided by cloud service providers today to manage and share digital content in a secure manner....
Aug. 28, 2016 09:30 AM EDT Reads: 758
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...
Aug. 28, 2016 09:30 AM EDT Reads: 696
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
Aug. 28, 2016 07:30 AM EDT Reads: 772
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Aug. 28, 2016 07:00 AM EDT Reads: 2,396
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
Aug. 28, 2016 03:30 AM EDT Reads: 2,358
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
Aug. 28, 2016 02:00 AM EDT Reads: 1,780
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Aug. 28, 2016 01:45 AM EDT Reads: 2,161
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Aug. 28, 2016 01:30 AM EDT Reads: 2,100
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Aug. 28, 2016 01:00 AM EDT Reads: 2,969
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Aug. 28, 2016 12:15 AM EDT Reads: 1,839
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Aug. 27, 2016 08:45 PM EDT Reads: 2,364
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Aug. 27, 2016 08:45 PM EDT Reads: 1,784