Download document () of 20
Complete assessments
People, process and technology
Minimally disruptive
Avoid unnecessary downtime
Simple
Cybersecurity as a service

Core features

cyber-security-framework.jpg
Reprinted courtesy of the National Institute of Standards and Technology, US Department of Commerce. Not copyrightable in the United States.

Technical framework

  • Eaton cybersecurity services are based on the NIST Cybersecurity Framework and customised for OT/ICS using mappings to NIST SP800-82IEC 62443 and other industry standards and best practices from SANS and the Center for Internet Security (CIS) Critical Security Controls (CSC’s)
  • Eaton also offers services tailored to IEC 62351NERC CIP and other standards

Did you know?

of operational technology networks have at least one direct connection to the public internet
40
%
of operational technology networks have at least one direct connection to the public internet
is the average cost of a malware attack on a company
$2m
is the average cost of a malware attack on a company
is the average time taken for a cybersecurity breach to be detected
6 mos.
is the average time taken for a cybersecurity breach to be detected

Eaton’s cybersecurity life-cycle management

We recognise that cybersecurity techniques that are effective today may not be tomorrow. Therefore, administrators of industrial networks must be ever-alert to changes in their OT networks and be constantly working to prevent operational vulnerabilities. With Eaton, it’s never “over and done with”. Our cybersecurity services are designed to provide complete life-cycle management to maximise the availability of your facility.

Trust Eaton to secure your operational technology

Over 100 years of developing products and services

Having designed hardware and software products for decades, along with providing the associated installation and maintenance services, Eaton is positioned to be the most capable cybersecurity provider in the industry for electrical infrastructure and building systems. Our experienced team of cybersecurity leaders identify and address gaps in your processes and personnel training programmes to minimise your overall exposure to attack.

 

Offering deep cybersecurity experience

Customers rely on Eaton to understand, investigate and alleviate cybersecurity risk. It starts with dedicated people. Our team members meet and exceed the competencies recognised by international standards organisations through rigorous, in-depth technical training programmes. You can be confident that management, engineering and personnel have the knowledge and service capabilities to address advanced cyber threats.

man and woman working in control center with monitors

Field experts backed by our Cybersecurity Center of Excellence (COE)

Specifications

New to Cybersecurity?

Our initial audit service is your first step towards establishing a robust cybersecurity programme. We will assess your people, process and technology, so you have a clear understanding of your strengths and weaknesses. From there we’ll work together, every step of the way, to develop a cybersecurity programme that is best for your operations and business.

 

Ready to follow industry standards and best practices?

Eaton’s comprehensive assessments are designed to thoroughly assess your cybersecurity practices, address vulnerabilities and consolidate your operations. We harness our electrical domain expertise to safely and passively collect data from your operational systems to minimise any disruption to your business or staff.

 

Making changes to your infrastructure?

Our cybersecurity commissioning service makes it easy to ensure your operations remain safe, secure and available every time you add or remove components or make changes to your facility.

 

Did you know human error and lack of awareness are often the weakest points of cybersecurity programmes?

Eaton’s broad cybersecurity consulting and training services are designed to ensure your teams are educated on ever-evolving threats and prepared to prevent and respond to cybersecurity incidents. 

 

Are only authorised devices communicating on your network?

The foundation of any asset management or maintenance programme is an accurate inventory. Eaton’s comprehensive assessments will produce a connected asset inventory and analyse your network for unauthorised devices and traffic. 

Our service foundations

NIST

  • SP 800-53R4, SP 800-82R2
  • SP 800-37 (RMF), FIPS 140-2
  • Critical Infrastructure Framework
  • NISTIR 7678 Vol 1 Rev 1

IEC

  • IEC 62443
  • IEC 62351
  • IEC 61850

UL

  • Standard for Software Cybersecurity for Network-Connectable Products (2900-1)

US Department of Defense

  • Unified Facilities Criteria (UFC) 4-010-06 (MIL-STD 3007)

NERC

  • NERC CIP

US Department of Homeland Security

  • Catalogue of Control Systems Security
  • SCADA Procurement Language
  • ICS-CERT

Best Practices

  • SANS
  • Center for Internet Security
Download Links