Cyber Security solutions for the Power Sector and Utilities

Valiant Communications offers a comprehensive range of Cyber Security suite of products and solutions that are designed for the Power Sector, Utilities and SCADA applications. VCL “Beyond the Firewall” cyber-security solutions are designed to assist organizations to detect, prevent and secure their network against firewall breaches, cyber-attacks, ransomware-attacks, DoS attacks, conduct forensic analysis and trace the attack route in near real-time.

VCL Cyber Security products assist network administrators to identify existing network vulnerabilities and implement a “real-time” counter-measure defence strategy which automatically comes into effect in the event of a cyber-attack / firewall breach. VCL advanced and comprehensive cyber defence solutions generate audio-visual alarms, to automatically switching to a redundant network / to a redundant firewall, as well as to isolate the network and protect the critical infrastructure assets in case of a cyber-attack / firewall breach / DoS attack.

Commenting on the solution, Mr. Inder Mohan Sood, CEO said “Requirements for managing a crisis arising out of cyber threats and for implementing an effective countering defence policy against cyber-attacks and cyber-terrorism is becoming increasingly critical as the power utility communication systems migrate from legacy, time-division multiplexing (TDM) infrastructure networks to Internet Protocol (IP) packet-based networks. The transition to more advanced and efficient communication systems which serve a distributed energy grid and metering resources also results in an increase of such network’s vulnerability.

The artificial air gap created between IT and OT Systems by deploying only firewalls between any IT and OT System can be easily circumvented by any insider or any outsider. In short, having only firewalls as a tool to address a cyber-security defence strategy is a myth”.

Valiant’s unique cyber defence strategy solution comprises of the following key features for implementation of an effective and definitive counter-defence strategy:

  1. Using “Early Warning and Response Systems” behind firewalls to detect cyber security incidents for mitigation of such cyber threats.
  2. Safeguarding computer systems using early cyber-attack warning and intrusion detection devices with suitable audio-visual alerting mechanisms.
  3. Detecting cyber-attacks on SCADA and ICS systems.
  4. Detecting cyber breaches in the IT and OT networks and installing suitable alerting mechanisms.
  5. Detecting data leaks to protecting critical organizational data.
  6. Installing capability of conducting forensic analysis in real time.
  7. Creating Isolatable Operational Zones, which would include:
    • To have the capability to automatically carry out physical asset isolation (the ability to isolate a specific location or an individual telecom rack which may be source of the threat.
    • Installing Network Isolation Switches to instantly disconnect the critical zones within the LAN network from the WAN network in the event of the detection of a cyber-attack.
    • Implementing automatic hard isolation of all back-up OT Systems (such as NAS/SAN, Data Storage Servers) from any network facing IT infrastructure in the event that a network breach is detected to ensure that the back-up sensitive data always remains un-compromised and protected.
    • Create operational zone isolation and mechanisms of islanding of all critical assets such as protection relays, bay-control units and data storage devices in the event that a network breach is detected.
  8. Identification of the network vulnerabilities which may be specific and unique to a particular network and suitably addressing them.
  9. Maintaining network reliability and network resilience by implementing automatic failover switches which physically move and reconnect all critical zones and assets such as “RTUs”, “PMUs” and related “Protection Assets” to standby transmission equipment and standby transmission routes.
  10. Conducting regular cyber security audits.

Additionally, an essential need for a Unified Network Management System for monitoring of all network assets from a central and multiple remote locations with user assignment and strong access controls.

  • Example: Real-time monitoring of Firewall, Routers to detect against network intrusions, trojan or malware activity and to provide resilience to ransomware attacks, DoS attacks, etc.,
  • Creating locational redundancy to monitor the cyber-security status.

A Unified Network Management System that will further enhance operational visibility of all cyber-security assets and greatly fortify the organizations IT infrastructure through improved surveillance and real-time management and control.

The overall comprehensive solution which would emerge would encompass the implementation of intrusion network-detection and early-warning alerting systems at various points or the network and effectively assist in the implementation of a comprehensive counter-defence strategy which shall automatically execute in an eventuality that a cyber-attack or network breach is detected and protect of all “Critical Power Generation, Transmission and Distribution Assets”.

In summary – the VCL unique differentiators:

  • Automatically executes a counter-defence strategy if a network intrusion / cyber-attack is detected by isolating the critical infrastructure assets.
  • Provides audio-visual alerts in the event of detection of a network intrusion / cyber-attack.
  • Monitoring and visualization of all cyber-security equipment, alarms, and events in real-time.
  • Assists in providing forensic analysis in near real-time
  • Provides the option of 1+1 redundancy with automatic failover of equipment and networks
  • No single point of failure in the network for enhanced resilience

Copyright: Valiant Communication Limited

Read more...

About Valiant Communications: Valiant Communications is a manufacturer and exporter of a wide range of communications, transmission, protection, synchronization and cyber security products. It is an approved manufacturer to some of the major power utilities across the globe, with track record of successful installations in more than 5000+ power sub-stations worldwide including at 765kV power sub-stations, one of the highest functional power sub-station levels in the world.

Contact Us

United Kingdom

Valiant Communications (UK) Ltd.
Central House Rear Office,
124 High Street, Hampton Hill,
Middlesex TW12 1NS, United Kingdom
E-mail: United Kingdom - Sales

United States

Valcomm Technologies Inc.
4000 Ponce de Leon Blvd.,
Suite 470 Coral Gables,
FL 33146
E-mail: United States - Sales

India

Valiant Communications Limited
71/1, Shivaji Marg,
New Delhi-110 015
(India)
E-mail: India - Sales

Valiant Communications is an ISO 9001:2015, ISO 10001:2018, ISO 14001:2015, ISO 27001:2013 and ISO 45001:2018 certified equipment manufacturer.