Download document () of 20
Services

Cybersecurity services

Industrial facilities are increasingly integrating and deploying smart, digital technologies into their OT infrastructure. As this happens, systems become more connected and the exposure to potential vulnerabilities and damaging cyber events increases. Eaton can help you develop a comprehensive strategy to mitigate risks across your electrical infrastructure and OT environment. Our team of certified experts is prepared to help you build up cyber resiliency throughout your operation so you can proactively respond to cybersecurity threats—resulting in minimal interruptions to your operations. With our support, we give you peace of mind, knowing that your systems and most critical assets are protected.

Eaton's Cybersecurity Service Contents

  • Full life-cycle services focusing on people, process and technology
  • Eaton follows industry standards and best practices, allowing us to universally apply our Cybersecurity Services to all types operational technology networks (ICS, EPMS, SCADA, etc.)
  • 100+ years of experience in designing/implementing OT solutions in multiple markets, regions and segments
  • Certified and qualified OT personnel dedicated to safely safely assess infrastructure equipment and maximizing availability of OT systems and devices 
  • Risk management, verification and validation are built into all our processes
  • Conducting vulnerability scanning and penetration testing on operating systems is our specialization area in EMEA. Our methodology combines passive and active approaches, exposing and verifying weaknesses and vulnerabilities that attackers can use to access utility networks and critical processes.
  • Cybersecurity assessments give thorough overview of current status of cybersecurity.  We inspect all technical aspects including guidelines, processes, network architecture designs and device/network configurations.
cyber-security-framework.jpg

Technical framework

  • Eaton cybersecurity services are based on the NIST Cybersecurity Framework and customized for OT/ICS using mappings to NIST SP800-82IEC 62443 and other industry standards and best practices from SANS and the Center for Internet Security (CIS) Critical Security Controls (CSC’s)
  • Eaton also offers services tailored to IEC 62351NERC CIP and other standards

Did you know?

of operational technology networks have at least one direct connection to the public internet
40
%
of operational technology networks have at least one direct connection to the public internet
is the average cost of a malware attack on a company
$2 mm
is the average cost of a malware attack on a company
is the time taken for a cybersecurity breach to be detected
6 months
is the time taken for a cybersecurity breach to be detected

Eaton’s cybersecurity life-cycle management

We recognize that cybersecurity techniques that are effective today may not be tomorrow. Therefore, administrators of industrial networks must be ever-alert to changes in their OT networks and constantly working to prevent operational vulnerabilities. With Eaton, it’s never “one and done”. Our cybersecurity services are designed to provide complete life-cycle management to maximize the availability of your facility.

Trust Eaton to secure your operational technology

Over 100 years developing products and services

Having designed hardware and software products for decades, along with providing the associated installation and maintenance services positions Eaton as the most capable cybersecurity provider in the industry for electrical infrastructure and building systems. Our experienced team of cybersecurity leaders identify and address gaps in your processes and personnel training programs to minimize your overall attack surface.

 

Eaton is working tirelessly to protect customers from cybersecurity threats

 

Offering deep cybersecurity experience

Customers rely on Eaton to understand, dissect and alleviate cybersecurity risk. It starts with dedicated people. Our team members meet and exceed competencies recognized by international standards organizations through rigorous, in-depth technical training programs. You can be confident that management, engineering and personnel have the knowledge and service capabilities to address advanced cyber threats.
Specifications

Cybersecurity services portfolio

CS benefits.png

New to Cybersecurity?

Our initial audit service is your first step towards establishing a robust cybersecurity program. We will assess your people, process and technology so you have a clear understanding of your strengths and weaknesses. From there we’ll work together, every step of the way, to develop a cybersecurity program that is best for your operations and business.

 

Do you know how to protect your critical infrastructure and processes?

With our thorough assessment methodology, we can help you to discover weaknesses and vulnerabilities that expose you to attackers or malicious actors, and guiding you to build a robust protection and detection capabilities. We have specialized in verifying findings with scanning and penetration testing with our industry proofed approach.

 

Full assessment approach 

Cybersecurityservices.png

 

Ready to follow industry standards and best practices?

Eaton’s comprehensive assessments are designed to thoroughly assess your cybersecurity practices, address vulnerabilities and harden your operations. We leverage our electrical domain expertise to safely and passively collect data from your operational systems to minimize any disruption to your business or staff.

 

Making changes to your infastructure?

Our cybersecurity commissioning service makes it easy to ensure your operations remain safe, secure and available every time you add, remove or make changes to your facility.

 

Did you know human error and lack of awareness are often the weakest points of cybersecurity programs?

Eaton’s broad cybersecurity consulting and training services are designed to ensure your teams are educated on ever-evolving threats and be prepared to prevent and respond to cybersecurity incidents. 

 

Are only authorized devices communicating on your network?

The foundation of any asset management or maintenance program is an accurate inventory. Eaton’s comprehensive assessments will produce a connected asset inventory and analyze your network for unauthorized devices and traffic. 

Our service foundations

NIST

  • SP 800-53R4, SP 800-82R2
  • SP 800-37 (RMF), FIPS 140-2
  • Critical Infrastructure Framework
  • NISTIR 7678 Vol 1 Rev 1

IEC

  • IEC 62443
  • IEC 62351
  • IEC 61850

UL

  • Standard for Software Cybersecurity for Network-Connectable Products (2900-1)

NERC

  • NERC CIP

Best Practices

  • SANS
  • Center for Internet Security
Download Links