CG Automation Solutions USA

Size: px
Start display at page:

Download "CG Automation Solutions USA"

Transcription

1 CG Automation Solutions USA (Formerly QEI Inc.) Automation Products and Solutions

2 CG Automation Works for You INDUSTRY SOLUTIONS Electric T&D Utilities Renewable Energy Transit Authorities Public Power Electric Generation Steam Distribution Oil & Gas Water/ Wastewater Government Industrial OEM CG Automation is a leading SCADA system and automation equipment supplier with a long history of innovation and technical leadership in electric network monitoring and control applications. CG Automation is the oldest and most experienced U. S. based supplier of SCADA and automation solutions for Electric, Transit, Renewable and Water/Wastewater utilities. CG Automation has developed monitoring and grid automation equipment over five decades, with each generation built on experience gained from the previous. CG Automation's devices are designed to satisfy the needs of the utility industries with rugged, programmable, off-the-shelf modules, engineered and assembled at our factory to form integrated systems that meet the specific operational needs of each Customer. CG Automation is a full spectrum supplier and its product and system offerings cover the full range of public transit and electric utility markets from control centers to substation applications to distribution feeder automation. CG Automation s broad product range utilizes the latest in communications, software and microprocessor technologies. Continual emphasis is given to active product research and development that incorporates industry trends and our Customers requirements. COMPLETE SOLUTIONS - FROM CONCEPT TO OPERATION

3 Flexible Solutions for your Automation Needs CG Automation s technology provides a total end-to-end solution COMMITMENT TO OPEN STANDARDS CG Automation is fully committed to technological innovations and makes significant investments into research and development activities. Included in this effort is the active participation in industry associations that are working on enabling technologies for SCADA and substation automation applications. Substation Automation Intelligent Communication Gateways RTUs Automation Processors RTU Retrofits Substation HMI Overhead/Underground Distribution Automation Self-Healing Grid Capacitor Controls Generation Renewables SCADA Master Station

4 Solutions for Substations FLEXIBLE SOLUTIONS CG Automation s products are designed to maximize your automation effectiveness by using a modular architecture, all with common processors, operating system, configuration and diagnostic tools. STN-9150 Remote Terminal Unit CG Automation s family of substation class hardened products provide secure, programmable control and monitoring of remote equipment with concentration of data from multiple source devices in electrically and environmentally demanding remote locations. CG Automation offers robust and proven technologies with a family of secure, reliable products and features for the full range of your current and future substation applications. epaq 9420 Multifunction Gateway The Heart of Your Grid s Smarts Traditional RTUs Protocol Converters Communication Gateways Data Concentrators Integration and Automation Platforms RTU Retrofits THE CG AUTOMATION ADVANTAGE NERC-CIP Compliant Support for large library of the latest standard and legacy protocols Multiple communications media support Modular assemblies for integrating IEDs AND local discrete I/O Provides secure access to real time and engineering data based on roles

5 Solutions for Distribution Automation Transducerless monitoring and control for feeder devices IED integration Gateway/data concentrator Network or serial based communication interfaces Feeder Automation Applications and programmable logic FDIR, automatic source transfer, sectionalizing Pole, wall, pedestal, pad mount or submersible DRT 9060 Transducerless RTU AUTOMATIC CAPACITOR CONTROLS ecap II SCADA Directed Capacitor Controller The mcap and ecap controls provide all the power and flexibility you expect in a best of class yet affordable unit. Complete flexibility in configuration, control strategies, mountings Remote SCADA control and data access via DNP or Modbus Support for all communications gear Smartware II Windows based configuration, monitoring and data viewing tool SCADA link failover to local control program Single phase, single step or three phase, multi-step Settings for overrides, timers, holidays Strategy settings adjusted via SCADA NERC CIP authentication security

6 Solutions for Visualization and Operations CG Automation s SCADA offerings, TDMS-PLUS (Total Distribution Management System) and SCADA Studio, focus on the monitoring and control of electric, water, and gas distribution systems. Built on the highly reliable and secure HP OpenVMS platform and Microsoft Windows operator consoles, TDMS-PLUS provides mission critical availability through the use of distributed redundancy in disastertolerant configurations. SCADA Studio provides an affordable yet robust Windows based complete SCADA solution deployable across desktop, server, web, mobile or embedded platforms. CG Automation s SCADA systems are used to monitor and control the electrical network from the distribution substations to the enduser. They are also found in many major transit systems as well as renewable energy plants. FEATURES and SUPPORT Distribution Management Systems Import GIS system map Extensive protocol library Powerful database editing tools Trending and reporting Historical archival Advanced Application Modules NERC CIP compliant patch management Turn-key onsite startup and training Quad redundancy failover servers for off-site disaster recovery There has never been a second lost to a computer worm or virus on a CG Automation SCADA server.

7 Configuration and Diagnostics Modern Tools for Effective Automation FEATURES Modern and friendly Windows or Web based tools One software used to configure any RTU platform Pre-defined IED templates library Configure locally or remotely over network Drag-and-drop points mapping CG Automation brings together all the tools you need to easily place your automation equipment into service. Our focus is to provide the configuration software solutions that make you the most effective when commissioning or troubleshooting our products. CG Automation provides modern software for managing each automation suite: CONFIGWIZ for RTUs and gateways Fully NERC CIP compliant user security Import/export to MS Excel for bulk editing On-line local or remote test and diagnostics Load, save and reuse configurations Real-time math calculation, logic and control scripts SmartWare II for Capacitor Controls TDMS Plus -Editor for SCADA master station

8 Secure Solutions There has never been a second lost to a computer worm or virus on a CG Automation SCADA server. Architecture for Critical Infrastructure RTU and Master use non- Windows operating systems Security Administration Console Broad technologies applied across entire security surface area Focus on attack prevention, detection, audit, recovery High availability options Incorporate state of the art cyber security communications standards Electrical utilities are responsible for defining critical cyber assets which are vital to their continuing operation. These assets are then systematically protected through well defined processes, methods, and procedures outlined in a federal government standard for Critical Infrastructure Protection (CIP). The procedures for compliance follow a standard developmental road map created by the North American Electric Reliability Corporation (NERC) and are contained in the NERC CIP standards found at Utilities designated as Responsible Entities are responsible for being auditably compliant with the NERC CIP standards. CG Automation supports the utility s mission critical security compliance efforts by: Adapting provided software/ firmware to comply with NERC CIP guidelines Creating additional software or services to aid in compliance efforts Evaluating third party hardware or software which may be useful for user compliance efforts Implementing and documenting sound internal procedures for supporting compliance with NERC CIP guidelines. NERC-CIP Compliant Solutions

9 CG Automation Solutions NERC-CIP Support CIP-002 Critical Cyber Asset Identification Analyze the documents provided and document items that internally or externally meet criteria for identification CIP-003 Security Management Controls Individual user accounts requiring strong passwords, certificate or hardware keys Fine grained rights management by specific users Role based access privileges: Administration vs. Operations Time stamped logging of all accesses, changes and controls CIP-004 Personnel and training Publish to users relevant security threats and solutions Provide targeted training on security features in hardware and software Maintain current criminal background checks for CG Automation personnel CIP-005 Electronic Security Perimeter Encrypted Remote Access Individual control of open ports Restricted executable downloads VPN using IPSec for encryption and authentication Dial-back client Appropriate use banner at all access points CIP-006 Physical Security Integration capabilities to commercially available physical security systems CIP-007 System Security Management Comprehensive logging and reports for all security related events SCADA status points for security alarms Configuration changes logged and password protected Provide Security Patch Management service with automated notification Bundle anti-virus software for appropriate equipment SNMP protocol available Software and firmware version control, testing, documentation Separate administrative and operational configuration Non-Windows based OS CIP-008 System Security Management Comprehensive reports are secure archived in memory or data warehouse Record all user data, accesses, alarms, port assignments, configuration changes, local control operations CIP-009 System Security Management SCADA System backup/restore with media integrity verification Co-located or distributed quad-redundant failover SCADA master servers Option for CGA factory based off-site backup, verify, restore service Options for redundancy in RTU processors and communications

10 Service and Support CG Automation is Quality and Commitment SUPPORT SERVICES As one of the largest independent firms providing SCADA to the utility and communications industry, CG Automation is large enough to retain the best personnel, yet small enough for our personnel to have a keen interest in our customers satisfaction. We will continue to innovate with excellence while responding to the needs of the market. You can build your information and control infrastructure with confidence using CG Automation. CG Automation is committed to providing the highest level of quality in our products and systems as evidenced by our ISO-9001:2008 certification. CG Automation s commitment to quality provides our customers with the assurance that consistent high quality systems and products will be delivered. CG Automation is a highly selfsufficient organization having all the technical, sales, manufacturing, support, services and business resources needed to execute projects in an effective and timely manner to the full satisfaction of its customers. Factory-based customer service department Fully equipped factory training facility On-site, web-based, or customized training available Field service technicians provide full installation, configuration, startup and maintenance assistance Maintenance agreements for all hardware and software Customer service web portal In-house repairs on equipment and components Annual User Conferences with optional follow-on training

11 About CG Automation Solutions USA Founded in 1960 as Quindar Electronics Incorporated, the company was an early adopter of solid state technology for industrial applications with the introduction of the first transistorized voice frequency (audio tone) telemetry products for electric network monitoring and control applications. Quindar rapidly became the leading supplier of such products to the electric utility and transit industries. Over the next 50 plus years, QEI has kept pace with the rapidly evolving technology developments in software and hardware. Continuing Research and Development was established and has regularly produced new generations of SCADA systems and RTUs responding to Customer demands and application of improved technology. The addition of new products such as capacitor controls has further expanded QEI s recognition as a market leader in automation. In 1975 the company was reorganized and its name was shortened to QEI (Quindar Electronics Incorporated) and continued to serve the same markets with innovative products and systems. You ve Got the Power We Give you Control In 2011, QEI became the platform for Crompton Greaves LTD (CGL) North American automation operation. CGL is a flagship company of the Avantha Group, an India-based multinational in the electrical Transmission & Distribution business and a global supplier of a wide range of products and services to the utility industry. With nearly 50 continuous years of primary business in the SCADA and automation market, including public transit and electric utility applications, CG Automation is the oldest and most experienced supplier of such systems in the world.

12 CG Automation provides a wide variety of Automation products and services to the Electric Utility Industry. CG Automation's customers are a mixture of major utilities, government and military agencies as well as global Electrical Transmission and Distribution OEM's. To unify our global focus, all CG facilities across the world have taken actions to ensure that customers receive consistent "One World Quality", for all CG products and solutions in all parts of the world. SMART GRID SYSTEMS SERVICES SALES SUPPORT CG Automation Solutions USA Inc Automation Solutions 60 Fadem Road Springfield, NJ USA T: F: E: [email protected] W: This literature is for illustration purposes only, and is not part of any contract. As we have a policy of continuous product improvement, any features may be modified without notice. All trademarks and names mentioned in this document remain the exclusive property of their holder. V1.0 8/12

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

Document ID. Cyber security for substation automation products and systems

Document ID. Cyber security for substation automation products and systems Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has

More information

Symphony Plus Cyber security for the power and water industries

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

More information

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated

More information

DIGITAL CONTROL SYSTEM PRODUCT SOLUTIONS

DIGITAL CONTROL SYSTEM PRODUCT SOLUTIONS Multi-function substation server Unlock the value of your substation data with Alstom s multi-function substation server Enabling the Smart Grid with Alstom's DAP server The is a multi-function substation

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

Advanced TDMS Database Training COURSE OUTLINE

Advanced TDMS Database Training COURSE OUTLINE Advanced TDMS Database Training COURSE OUTLINE This course is intended to leverage existing knowledge of TDMS databases. Advanced functions will be covered that enhance the end-user experience or allow

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process. CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected]

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected] It s February 19, 2009 132 project days left to compliance Do you know where (what)

More information

Semaphore T BOX Applications in Data Center Facilities

Semaphore T BOX Applications in Data Center Facilities Semaphore T BOX Applications in Data Center Facilities Introduction Data centers must reliably provide 24/7/365 operation. For automation and monitoring of the facility, use of a rugged, reliable RTU is

More information

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Client-Server SCADA Technology

Client-Server SCADA Technology Client-Server SCADA Technology A FULL WEB BROWSER-BASED SUITE BRIDGING THE OPERATION & INFORMATION GAP WITH WEB BROWSER DASHBOARDS FOR: v MANAGEMENT DECISION MAKERS v PRODUCTION/ OPERATIONS v MOBILE WORKFORCES

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

ISACA rudens konference

ISACA rudens konference ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial

More information

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected]

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected] It s February 19, 2009 132 project days left to compliance Do you know where (what)

More information

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

HMS Industrial Networks. Putting industrial applications on the cloud

HMS Industrial Networks. Putting industrial applications on the cloud HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems GE Intelligent Platforms Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Overview There is a lot of

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC

More information

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper

More information

Manage Utility IEDs Remotely while Complying with NERC CIP

Manage Utility IEDs Remotely while Complying with NERC CIP Manage Utility IEDs Remotely while Complying with NERC CIP Disclaimer and Copyright The information regarding the products and solutions in this document are subject to change without notice. All statements,

More information

Cyber security measures in protection and control IEDs

Cyber security measures in protection and control IEDs Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden [email protected] Abstract: The electric power grids and power systems are critical

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

FERC, NERC and Emerging CIP Standards

FERC, NERC and Emerging CIP Standards Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution Embracing standards helps prevent costly fines and improves operational efficiency Bradford Hegrat, CISSP, Principal

More information

Vanguard Knowledge Automation System

Vanguard Knowledge Automation System KNOWLEDGE AUTOMATION SYSTEM: OVERVIEW Vanguard Knowledge Automation System Turn routine processes into easy-to-use Web Apps Vanguard Knowledge Automation System lets you capture routine business processes

More information

ACI ON DEMAND DELIVERS PEACE OF MIND

ACI ON DEMAND DELIVERS PEACE OF MIND DELIVERS PEACE OF MIND SERVICE LINE FLYER ACI ON DEMAND ACCESS TO THE LATEST RELEASES OF FEATURE-RICH SOFTWARE AND SYSTEMS, INCLUDING INTEGRATION WITH VALUE- ADDED THIRD PARTIES IMPLEMENTATION CONFIGURED

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

GE Measurement & Control. Cyber Security for Industrial Controls

GE Measurement & Control. Cyber Security for Industrial Controls GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account

More information

ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery

ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery ABB North America Substation Automation Systems Innovative solutions for reliable and optimized power delivery Substation Automation Systems Advanced substation automation, protection and control solutions

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Presentation to the U.S. Department of Energy by the IEEE Joint Task Force on QER Trends: Resilience

More information

Virtualization In Manufacturing Industries. Copyright 2012 Rockwell Automation, Inc. All rights reserved.

Virtualization In Manufacturing Industries. Copyright 2012 Rockwell Automation, Inc. All rights reserved. Virtualization In Manufacturing Industries Rev 5058-CO900C What is Virtualization? Traditionally the OS and its applications were tightly coupled to the hardware they were installed on Virtualization breaks

More information

ACE3600 HIGH PERFORMANCE MONITORING & CONTROL REMOTE TERMINAL UNIT

ACE3600 HIGH PERFORMANCE MONITORING & CONTROL REMOTE TERMINAL UNIT HIGH PERFORMANCE MONITORING & CONTROL REMOTE TERMINAL UNIT PAGE 1 EMPOWER YOUR SCADA NETWORK Utilities, now more than ever, are facing newer and greater hurdles. Multiple wired and wireless communication

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

SCADA Questions and Answers

SCADA Questions and Answers SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...

More information

Cyber Security Compliance (NERC CIP V5)

Cyber Security Compliance (NERC CIP V5) Cyber Security Compliance (NERC CIP V5) Ray Wright NovaTech, LLC Abstract: In December 2013, the Federal Energy Regulatory Commission (FERC) issued Order No. 791 which approved the Version 5 CIP Reliability

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

NERC CIP Tools and Techniques

NERC CIP Tools and Techniques NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs [email protected] (843) 619-0050 October

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft Agenda Security Development Lifecycle Initiative Using PI to Protect Critical Infrastructure Hardening Advice for the PI

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

Protecting productivity with Plant Security Services

Protecting productivity with Plant Security Services Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

GE Measurement & Control. Cyber Security for NERC CIP Compliance

GE Measurement & Control. Cyber Security for NERC CIP Compliance GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes

More information

The integrated HMI-PLC

The integrated HMI-PLC Industry Application IA05003001E The integrated HMI-PLC Rich Harwell, Eaton Corporation The heart of a lean automation solution Lean manufacturing is a proven, powerful tool that boosts efficiencies in

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

Open Enterprise Architectures for a Substation Password Management System

Open Enterprise Architectures for a Substation Password Management System CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System

More information

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management DS Series Solutions IT Infrastructure Management Tools to Reduce IT Operational Costs and Increase IT Productivity

More information

HMS Industrial Networks

HMS Industrial Networks HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245

More information

Securing Distribution Automation

Securing Distribution Automation Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010

More information

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,

More information

Kevin Kochirka, ABB Turbine Automation, June 29, 2016. Flexible turbine control retrofits Webinar

Kevin Kochirka, ABB Turbine Automation, June 29, 2016. Flexible turbine control retrofits Webinar Kevin Kochirka, ABB Turbine Automation, June 29, 2016 Flexible turbine control retrofits Webinar Welcome Speaker introduction Kevin Kochirka Sr. Applications Engineer with ABB Inc. [email protected]

More information

Microsoft SQL Server on Stratus ftserver Systems

Microsoft SQL Server on Stratus ftserver Systems W H I T E P A P E R Microsoft SQL Server on Stratus ftserver Systems Security, scalability and reliability at its best Uptime that approaches six nines Significant cost savings for your business Only from

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction... 1. Background... 1. Secure Access Link...

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction... 1. Background... 1. Secure Access Link... Secure Access Link Table of Contents Introduction... 1 Background... 1 Secure Access Link... 2 Components... 3 Aggregated Traffic... 5 Flexible Authentication. and Authorization... 6 Complete Control over.

More information

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008 Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson

More information

Sus tain.ability. 2012 Honeywell Users Group Asia Pacific. Annemarie Diepenbroek, Greg Belcher Experion Overview and New Solutions

Sus tain.ability. 2012 Honeywell Users Group Asia Pacific. Annemarie Diepenbroek, Greg Belcher Experion Overview and New Solutions Sus tain.ability. 2012 Honeywell Users Group Asia Pacific Annemarie Diepenbroek, Greg Belcher Experion Overview and New Solutions 2 Experion PKS Orion: Reshaping Automation Process knowledge in the field

More information

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Cyber Security. Global solutions for energy automation. Benefit from certified products, system solutions. www.siemens.

Cyber Security. Global solutions for energy automation. Benefit from certified products, system solutions. www.siemens. Benefit from certified products, system solutions Cyber Security Global solutions for energy automation WIB Certification www.siemens.com/gridsecurity Cyber Security: Security from the very start More

More information

Natural Gas Well Automation using Kingfisher RTU Products

Natural Gas Well Automation using Kingfisher RTU Products Natural Gas Well Automation using Kingfisher RTU Products Introduction Semaphore s Kingfisher RTU products have been applied to well site installations throughout the world. The product family includes

More information

SCADA/Business Network Separation: Securing an Integrated SCADA System

SCADA/Business Network Separation: Securing an Integrated SCADA System SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater

More information

Designing a security policy to protect your automation solution

Designing a security policy to protect your automation solution Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...

More information

Cisco Incident Response and Workforce Enablement for the Utility

Cisco Incident Response and Workforce Enablement for the Utility Cisco Incident Response and Workforce Enablement for the Utility Over the next ten years, it is predicted that aging energy infrastructure and utility industry workforce will undergo their greatest transition

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure RUGGEDCOM CROSSBOW Secure Access Management Solution Brochure Edition 10/2014 siemens.com/ruggedcom Siemens RUGGEDCOM CROSSBOW Secure Access Manager and Station Access Controller Siemens RUGGEDCOM CROSSBOW

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Desktop Virtualization Solutions Simplified Appliance

Desktop Virtualization Solutions Simplified Appliance Desktop Virtualization Solutions Simplified Appliance Seizing opportunities in today s mobile and social world Today s business models and customer engagements are increasingly real-time, dynamic and contextual.

More information