Go to content

Utilities

Utilities are a vital part of our daily activities and they mostly go unnoticed since people expect them to be there. Hackers are well aware of their importance and know that a disruption of these services can result in a large financial compensation. There have also been incidents of foreign governments targeting utility services through cyber-attacks as a form of warfare. Our modern economy and lifestyles are dependent on reliable utility services. If we don't invest in protecting utilities, we risk exposing people to personal and financial hardships.

Utilites

Key benefits

  • 01

    Holistic view of the infrastructure

    Nanitor provides an overview of all devices, software, users, configurations, known vulnerabilities, and missing security patches matched against compliance framework requirements. The outcome is a prioritized task list across your whole infrastructure that makes your remediation systematic and enjoyable.

  • 02

    Risk-based prioritization

    Make the most of your limited resources by prioritizing the highest-risk issues. Nanitor assesses the risk of discovered issues based on external sources and assigns a prioritization score based on the asset criticality.

  • 03

    Blast radius minimization

    Reduce the risk of lateral movement by hardening relevant configurations and known vulnerabilities. The best practice benchmarks for security configurations and known vulnerability databases are included in the platform.

  • 04

    Automatic monitoring

    Nanitor automatically (in 5-minute intervals) checks and reports on thousands of compliance-related security issues across your infrastructure. Trust is good, verification is better.

As Operational and Information Technology converge, organizations need to address their new security posture

With the efficiency and sustainability improvements being implemented, the previously separated technology groups are now working together. Many times, the only focus is making sure these new interactions are working correctly and security becomes an incidental task. This increases your attack surface and can potentially expose your organization with new entry points for hackers. It's important to include automated security that allows you to continuously monitor your environment as these changes are made.

Background photo - As Operational and Information Technology converge, organizations need to address their new security posture

Discover all the devices on your network

Internet of Things (IoT) devices are a popular solution to monitor and control OT infrastructure. IoT devices have simplified the management and operation of this infrastructure but they are known to inherently not provide security. Nanitor's Network Discovery service allows you to identify these and other devices that could be utilizing your network without your knowledge. It allows you to label these devices and assign a NPS rating.

Identify potential weaknesses in your Operational Technology

New vulnerabilities are constantly being discovered in software and it's important to be notified of these weaknesses. With Nanitor's vulnerability scanner, you'll stay up to date on the latest vulnerabilities, which devices are affected by the vulnerability, and the risk they pose to your environment. By quickly remediating the discovered vulnerabilities, you reduce the attack surface of your environment.

Implement compliance frameworks to help protect critical infrastructure

There are several cybersecurity frameworks throughout the globe that can help you secure your infrastructure. Nanitor provides the NCA ECC that specifically addresses critical infrastructures, ISO 27001 a globally recognized framework that can be used for IT infrastructures of any industry, and the NIST 800-53 which is a more rigorous framework designed for private business working with the US Federal government. You'll have the option of selecting your preferred framework or a combination of frameworks that help you improve your security posture.

Develop reports that accurately represent your security posture

Utility providers are constantly audited because of the value they provide to the economy and society. Nanitor provides accurate reports detailing the current state of your infrastructure. As soon as Nanitor is installed, it will start identifying the issues in your environment, tracking the progress of your remediation efforts, and continue monitoring for new issues. These reports can be tailored for auditors, your management, or the engineers that have to remediate the issues discovered.

ISO 27001 Framework

The ISO 27001 standards framework provides organizations the requirements for implementing an information security management system. Nanitor addresses the technical requirements by identifying risks and providing remediation solutions. Nanitor's automated detection and risk prioritization capabilities, allow your organization to quickly identify issues and focus on the risks that have the greatest impact on your organization. The reporting capabilities provide detailed information for the engineers remediating the issue and for the auditors that need to verify compliance.

PII Endpoint Scanner

The PII Endpoint Scanner can help businesses identify credit card and social security numbers that reside on any of your assets. This feature runs with optimization in mind by running a smart I/O and buffering scheme that minimizes memory usage. PII issues discovered contain information on the file name and a redacted extract of what was discovered in that file. The PII Endpoint Scanner can be configured to a specific country (US, UK and Iceland are currently available) and allows you to make exceptions for issues found.