Claroty Case Studies Electric Utilities
Claroty Logo

Electric Utilities

Claroty
Electric Utilities - Claroty Industrial IoT Case Study
Cybersecurity & Privacy - Identity & Authentication Management
Cybersecurity & Privacy - Intrusion Detection
Cybersecurity & Privacy - Malware Protection
Cybersecurity
Cybersecurity Services

Effectively securing its generation and transmission operations required the company to confront and overcome the following challenges:

  1. Inherently insecure OT networks: Complex and widely distributed architecture, limited OT visibility, and inadequate security controls gave attackers hundreds of possible entry points into the company’s OT networks.
  2. OT redundancy: The redundancy of the company’s OT environment meant that attacks were typically only detected if they caused immediate, easily noticeable damage. 
  3. Heavy reliance on OT remote access: The company’s power plants utilize a large number of unmanned power generation units and also rely on multiple vendors to maintain and service their heat recovery generation systems (HRGS). 
Read More

The company serves millions of customers over a nationwide transmission network

Read More

Power Generation and Transmission Company- Name not disclosed

Read More

The company deployed The Claroty Platform on top of its existing infrastructure and utilized the following components:

  1. Continuous Threat Detection (CTD) for full-spectrum OT asset visibility, continuous security monitoring, and real-time risk insights with zero impact on operational processes and underlying devices.
  2. Secure Remote Access (SRA) to safeguard OT networks from threats introduced via potential misconfigurations and unauthorized users, including third-party contractors.
  3. Enterprise Management Console (EMC) to simplify management overall, consolidating data from across The Claroty Platform and providing a unified view of assets, activities, and alerts across multiple sites. The platform also integrates seamlessly via EMC with IT infrastructure.
Read More
[Data Management - Cyber Security]

Comprehensive alerting and root-cause analysis mechanisms that enable the company’s security operations center (SOC) to know precisely when and why any anomalous or malicious activity occurs anywhere in any of its power plants’ OT networks.

[Efficiency Improvement - Operation]

Continuous, real-time assessment and reporting of the company’s overall OT risk profile automating and expediting what was once a tedious manual process

Download PDF Version
test test