{"id":7432,"date":"2014-11-21T06:00:38","date_gmt":"2014-11-21T14:00:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7432"},"modified":"2022-04-05T05:53:39","modified_gmt":"2022-04-05T12:53:39","slug":"9-core-capabilities-define-ics-security-platform","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/11\/9-core-capabilities-define-ics-security-platform\/","title":{"rendered":"9 Core Capabilities That Define An ICS Security Platform"},"content":{"rendered":"<p>Securing industrial control system (ICS) networks is crucial in this age of advanced persistent threats. Stuxnet changed the game for ICS a few years ago, and in 2014 <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/07\/havex-game-changing-threat-industrial-control-systems-part-1\/\" target=\"_blank\" rel=\"noopener\">it changed again with the Havex RAT variant<\/a>, which used techniques way more innovative than any threat we had yet seen targeting this industry.<\/p>\n<p style=\"text-align: left;\">With these threats in mind, Mario Chiock, a leading cybersecurity and disruptive technology executive adviser, and I got to thinking about what core capabilities really need to go into an ICS security platform. Naturally, that discussion led to the development of a full list of recommendations, which we're pleased to share with you in a new paper.<!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/21-century-cybersecurity-protection-platform-ics.html\" target=\"_blank\" rel=\"noopener\">Click here<\/a> to access your copy of \"Defining the 21st Century Cybersecurity Protection Platform for ICS.\"<\/p>\n<h3>For more<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\" target=\"_blank\" rel=\"noopener\">Read details on our complete security platform which spans network security, cloud-based threat intelligence and Advanced Endpoint Protection<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/11\/defend-scada-network-zero-day-threats-wildfire-appliance\/\" target=\"_blank\" rel=\"noopener\">Review our recent PAN-OS 6.1 release, which includes new capabilities in WildFire that will be especially useful to ICS professionals<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/industry\/scada-and-industrial-control\" target=\"_blank\" rel=\"noopener\">Visit our resources page for SCADA and ICS security<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Securing industrial control system (ICS) networks is crucial in this age of advanced persistent threats. Stuxnet changed the game for ICS a few years ago, and in 2014 it changed again with &hellip;<\/p>\n","protected":false},"author":46,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,566],"tags":[920,921,93],"coauthors":[693],"class_list":["post-7432","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-scada-ics","tag-havex-rat","tag-mario-chiock","tag-stuxnet"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7432"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7432\/revisions"}],"predecessor-version":[{"id":7433,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7432\/revisions\/7433"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7432"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}