Download document () of 20
Services

Cybersecurity services

Industrial facilities are increasingly integrating and deploying smart digital technologies into their OT infrastructure. As this happens, systems become more connected and the exposure to potential vulnerabilities and damaging cyber events increases. Eaton can help you develop a comprehensive strategy to mitigate risks across your electrical infrastructure and OT environment. Our team of certified experts is prepared to help you build up cyber resiliency throughout your operation so you can proactively respond to cybersecurity threats – resulting in minimal interruptions to your operations. With our support, you get peace of mind, knowing that your systems and most critical assets are protected.

Core features

cyber-security-framework.jpg

Technical framework

  • Eaton cybersecurity services are based on the NIST Cybersecurity Framework and customised for OT/ICS using mappings to NIST SP800-82IEC 62443 and other industry standards and best practices from SANS and the Center for Internet Security (CIS) Critical Security Controls (CSC’s)
  • Eaton also offers services tailored to IEC 62351NERC CIP and other standards

Full assessment approach 

Cybersecurityservices.png

Did you know?

of operational technology networks have at least one direct connection to the public internet
40
%
of operational technology networks have at least one direct connection to the public internet
is the average cost of a malware attack on a company
$2m
is the average cost of a malware attack on a company
is the average time taken for a cybersecurity breach to be detected
6 months
is the average time taken for a cybersecurity breach to be detected

Eaton’s cybersecurity life-cycle management

We recognise that cybersecurity techniques that are effective today may not be tomorrow. Therefore, administrators of industrial networks must be ever-alert to changes in their OT networks and be constantly working to prevent operational vulnerabilities. With Eaton, it’s never “over and done with”. Our cybersecurity services are designed to provide complete life-cycle management to maximise the availability of your facility.

Trust Eaton to secure your operational technology

Over 100 years of developing products and services

Having designed hardware and software products for decades, along with providing the associated installation and maintenance services, Eaton is positioned to be the most capable cybersecurity provider in the industry for electrical infrastructure and building systems. Our experienced team of cybersecurity leaders identify and address gaps in your processes and personnel training programmes to minimise your overall exposure to attack.

 

Eaton works tirelessly to protect customers from cybersecurity threats

 

Offering deep cybersecurity experience

Customers rely on Eaton to understand, investigate and reduce cybersecurity risk. It starts with dedicated people. Our team members meet and exceed the competencies recognised by international standards organisations through rigorous, in-depth technical training programmes. You can be confident that management, engineering and personnel have the knowledge and service capabilities to address advanced cyber threats.
Specifications

Cybersecurity services portfolio

Cybersecurity-Services.JPG

New to Cybersecurity?

Our initial audit service is your first step towards establishing a robust cybersecurity programme. We will assess your people, process and technology, so you have a clear understanding of your strengths and weaknesses. From there we’ll work together, every step of the way, to develop the best cybersecurity programme for your operations and business.

 

Do you know how to protect your critical infrastructure and processes?

Using our thorough assessment methodology, we can help you discover weaknesses and vulnerabilities that expose you to attackers or malicious actors and guide you to build robust protection and detection capabilities. We specialise in verifying findings through scanning and penetration testing according to our industry-proofed approach.

 

Ready to follow industry standards and best practices?

Eaton’s comprehensive assessments are designed to thoroughly assess your cybersecurity practices, address vulnerabilities and consolidate your operations. We harness our electrical domain expertise to safely and passively collect data from your operational systems to minimise any disruption to your business or staff.

 

Making changes to your infrastructure?

Our cybersecurity commissioning service makes it easy to ensure your operations remain safe, secure and available every time you add or remove components or make changes to your facility.

 

Did you know human error and lack of awareness are often the weakest points of cybersecurity programmes?

Eaton’s broad cybersecurity consulting and training services are designed to ensure your teams are educated on ever-evolving threats and prepared to prevent and respond to cybersecurity incidents. 

 

Are only authorised devices communicating on your network?

The foundation of any asset management or maintenance programme is an accurate inventory. Eaton’s comprehensive assessments will produce a connected asset inventory and analyse your network for unauthorised devices and traffic. 

Our service foundations

NIST

  • SP 800-53R4, SP 800-82R2
  • SP 800-37 (RMF), FIPS 140-2
  • Critical Infrastructure Framework
  • NISTIR 7678 Vol 1 Rev 1

IEC

  • IEC 62443
  • IEC 62351
  • IEC 61850

UL

  • Standard for Software Cybersecurity for Network-Connectable Products (2900-1)

NERC

  • NERC CIP

Best Practices

  • SANS
  • Center for Internet Security
Download Links