{"id":2058,"date":"2019-01-30T19:34:20","date_gmt":"2019-01-30T19:34:20","guid":{"rendered":"https:\/\/zed.inguardians.com\/?page_id=2058"},"modified":"2022-06-01T12:40:27","modified_gmt":"2022-06-01T19:40:27","slug":"ics","status":"publish","type":"page","link":"https:\/\/zed.inguardians.com\/ics\/","title":{"rendered":"ICS and IIoT Security"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.16″ background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/01\/Untitled-design-1-e1549055831159.jpg” background_size=”initial” background_position=”center_left” z_index_tablet=”500″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/08\/APT.png” align=”center” _builder_version=”4.16″ width=”40%” module_alignment=”left” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” text_text_color=”#ffffff” text_font_size=”20px” header_font=”||||||||” header_text_color=”#ffffff” header_font_size=”74px” header_font_size_tablet=”” header_font_size_phone=”41px” header_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”4.16″ background_color=”#294970″ background_color_gradient_direction=”181deg” background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/02\/golf_course_44.png” parallax=”on” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” padding_mobile=”off” global_colors_info=”{}”][et_pb_row padding_mobile=”off” column_padding_mobile=”on” admin_label=”row” module_id=”in-team-info” _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Cloud Security Description” _builder_version=”4.16″ text_font=”Arial||||||||” text_text_color=”#ffffff” text_font_size=”17px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_layout=”dark” text_font_size_last_edited=”off|” z_index_tablet=”500″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”]InGuardians Utilisec team brings decades of deep technical and executive experience to bear on ICS and Smart Grid projects. Our experience ranges from low-level hardware analysis to national policy development. InGuardians Utilisec Team members have built the tools, developed the methodologies, and delivered the training that our industry uses to test ICS environments. Our core services in ICS are hardware analysis, security architecture reviews, and custom training.<\/p>\n
The services below are a subset of what InGuardians can do for your organization.<\/strong> <\/em> InGuardians subject matter experts are available for press and public speaking opportunities. \u00a0We write, we teach, we do.<\/p>\n
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”4.16″ background_color=”rgba(255,255,255,0.88)” background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/02\/oil-refinery-2754223.png” background_size=”contain” background_position=”bottom_center” background_blend=”color-dodge” custom_padding=”54px|0px|52px|0px” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” padding_mobile=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#002f7c” box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Custom Training” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]For over eighteen years, InGuardians trainers have set the standard for excellence in the information security industry. \u00a0We have helped author and deliver some of the most popular courses at The SANS Institute, Black Hat, Cansec, Interop, RSA, IDA, Distributech, and on-site for private customers. \u00a0Contact us to get started on creating a customized training experience for your team.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#002f7c” box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Security Architecture Review” open=”on” _builder_version=”4.16″ global_colors_info=”{}” toggle_font=”||||||||”]The threat landscape facing organizations today requires a defensible architecture complete with preventative controls and detailed monitoring capabilities. \u00a0InGuardians security architecture services leverage IEC 62443, NIST 800-82, NIST 800-53, and NIST CSF to help your team defend your enclave, deter threats, and dominate your control networks. \u00a0InGuardians is also an expert at identifying secure remote access solutions to keep your remote operations as resilient as possible to malicious breach.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#002f7c” box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Hardware Assessments” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]InGuardians leads the industry in defining best practices for testing and deploying network-connected devices. \u00a0InGuardians\u2019 Utilisec team of hardware hackers brings over a decade of experience assessing securing Industrial Control System controllers, field devices, and the Internet of Things devices. \u00a0Contact us to test your hardware devices before you deploy them or integrate them into your solution.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#003068″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Internal Assessments” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]The old adage \u201chard and crunchy on the outside, soft and chewy in the middle\u201d was never more true than with ICS networks. \u00a0InGuardians is expert at leveraging IEC62443\u2019s cybersecurity enhanced Purdue model to identify techniques and methods to make your soft and chewy middle much less soft and chewy, with a strong emphasis on having no negative impacts on the safety and reliability of your processes.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#003068″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Product Review” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]InGuardians excels at assisting ICS customers to identify, review, and test security defenses in new products during solution acquisition, FAT, and SAT testing. \u00a0This includes such systems as master servers, historians, HMIs, controllers, and field devices.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#003068″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Wireless Assessments” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]Wireless comes in many more flavors than WiFi and Bluetooth, especially in ICS and IoT solutions. \u00a0InGuardians has helped create the industry\u2019s methodology for performing audits to discover deployed wireless solutions and assessing those wireless networks for security vulnerabilities, regardless of wireless protocols used, standard-based or proprietary. <\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#003068″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Incident Response” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]It is no longer a question of if, but when you will be breached. \u00a0Most organizations are ill-equipped to handle their own breach investigations. \u00a0During the past eighteen years, InGuardians has helped over one hundred Fortune 1000 companies recover from serious compromises. \u00a0The process of containing the breach and eradicating the attackers\u2019 access is often a daunting one. InGuardians Incident Response Team has the experience to help your organization recover.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#003068″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Press and Speaking” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]<\/p>\n<\/h2>\n