Palo Alto Networks Blog 2024年10月21日
Safeguard OT Environments with the Power of Precision AI
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

随着工业环境的数字化转型,操作技术(OT)环境面临着日益严峻的安全风险。为了保护这些工业设施,尤其是那些拥有传统系统、分布式操作和远程工作团队的设施,需要一种创新性的方法,既要保证正常运行时间,又要确保安全。我们很高兴地宣布,我们推出了新的OT安全解决方案,旨在解决这些不断变化的风险。

🚀 **精准AI驱动的虚拟补丁技术**:该解决方案使用机器学习、深度学习和生成式AI来提供实时保护。机器学习分析历史数据以准确检测威胁,深度学习构建预测模型以实时检测安全问题,而生成式AI通过自然语言界面增强用户体验,使系统更直观和智能。

🌐 **企业级远程访问安全**:通过引入新的Prisma Access浏览器及其特权远程访问功能,零信任网络访问(ZTNA)现已扩展到OT环境。这些针对OT的特定工作流功能确保为分布式员工和合作伙伴提供对IT、OT和云应用程序的安全无缝访问。

💪 **扩展到恶劣工业环境的ML驱动的安全**:Palo Alto Networks提供了一套针对各种工业需求量身定制的坚固型下一代防火墙(NGFW)。PA-400R系列专为苛刻环境(如公用事业变电站、工厂车间和可再生能源站点)而设计,具有高IP等级,可提供持久保护。

🔍 **增强资产发现和分析,加强OT监控和合规性**:通过我们工业OT安全服务中的高级资产发现和分析增强功能,加强对OT环境的可见性并简化合规性报告。我们的灵活资产发现技术(包括主动和被动方法)以及虚拟元数据收集器使您能够映射所有资产,即使是在远程或难以到达的位置。

📚 **OT特定参考架构,增强安全**:我们还推出了新的OT特定参考架构,包括设计和部署指南。这些包括使用工业DMZ保护OT服务,其中建立了在OT环境中创建安全隔离区的最佳实践,以及使用工厂分段保护OT基础设施,其中提供了分段工厂操作以增强安全性和降低风险的策略。

New capabilities safeguard OT remote operations, mitigate risks for critical, hard-to-patch assets, and extend protection into harsh industrial environments.

As operational technology (OT) environments undergo rapid digital transformation, so do their security risks. Protecting industrial setups, especially those with legacy systems, distributed operations, and remote workforces, requires an innovative approach that prioritizes both uptime and safety. We’re pleased to announce new advancements in our OT Security solution designed to address these evolving risks.

Our latest solution enhancements are designed to help customers address critical risks and threats by mitigating vulnerabilities in hard-to-patch OT assets, safeguarding remote operations and extending security into harsh industrial environments. These advancements ensure seamless security while minimizing the risk of disruption.

Mitigate OT Vulnerabilities Without Disruption — Powered by Precision AI

Introducing the industry's only fully integrated, risk-based Guided Virtual Patching solution for OT environments, designed to protect unpatched legacy OT assets at scale. Powered by Precision AI™ – our proprietary AI system – this solution combines machine learning, deep learning and generative AI to deliver advanced, real-time protection.

Machine learning analyzes historical data for accurate threat detection, while deep learning builds predictive models that detect security issues in real time. Generative AI enhances the user experience with a natural language interface, making the system more intuitive and intelligent.

With products powered by Precision AI, your organization gains comprehensive asset visibility, risk assessment, vulnerability prioritization, virtual patching and seamless threat prevention, all without downtime.

By leveraging the Palo Alto Networks Industrial OT Security solution, we're able to get a very accurate and up to date real-time inventory of all of our assets on the floor and manage the risk of each device.

– Mark Williams, director, Network Engineering, BorgWarner

Guided Virtual Patching is part of a new end-to-end risk management workflow that starts with a comprehensive risk assessment and attack surface mapping, enabling the quick identification and prioritization of critical vulnerabilities. By recommending threat prevention profiles and least privilege policies, Guided Virtual Patching reduces exposure and effectively secures hard-to-patch OT assets. Customizable risk scores allow you to adjust for asset criticality with confirmed compensating controls, giving you full control and audit trails over how risks are managed across your OT environment.

The end-to-end workflow helps cut through the noise, allowing you to focus on top-priority vulnerabilities and manage risks more efficiently, ensuring your mission-critical systems remain secure and fully operational without disruption.

Operational technology environments are becoming increasingly complex and interconnected, making them more susceptible to cyberthreats. The ability to deploy AI-powered tools, like guided virtual patching, is a game-changer for industrial cybersecurity. It enables organizations to address vulnerabilities in real-time without the costly and often disruptive downtime that traditional patching methods would require. This approach not only reduces risks but also enhances the overall resilience of OT infrastructures.

– Sid Snitkin, vice president, Cybersecurity Services, ARC Industrial Cybersecurity

Protect Remote Operations with Enterprise-Grade Security, Optimized for OT

As remote operations expand, securing them is essential. With the introduction of the new Prisma Access Browser and its Privileged Remote Access feature, Zero Trust network access (ZTNA) is now extended to OT environments. These OT-specific workflow capabilities ensure secure, seamless access to IT, OT and cloud applications for your distributed workforce across employees and partners.

With the rise of remote operations in industrial settings, secure remote access has become an essential component of OT security. Implementing Privileged Remote Access allows organizations to achieve secure connectivity without compromising operational efficiency. These innovations are critical in providing remote workers with the access they need while maintaining the integrity of OT networks.

– Hollie Hennessy, Principal Analyst, Omdia

Our remote access solution features a simple, browser-based architecture with an integrated jump server that reduces deployment complexity, making secure remote access management easier for both users and administrators. Tailored specifically for OT, it supports unique workflows and security compliance requirements, offering just-in-time access for OT administrators and session recording for audit and regulatory needs.

With end-to-end security powered by Precision AI, protection extends from the host to the network. Prisma Access Browser has over 20 capabilities to secure the host environment, such as host posture check, CDSS security services to secure file transfers, session recording and detailed audit trails. It additionally provides over 20 last mile and identity controls, such as JIT session provisioning, screenshot/sharing control, clipboard control and watermarks. Centralized management through Strata Cloud Manager further enhances operational efficiency, delivering consistent, secure remote access across IT and OT environments.

Extend ML-Powered Security Into Harsh Industrial Environments

We offer a suite of ruggedized NGFWs tailored to meet a range of industrial needs. The PA-400R Series is engineered for demanding environments, like utility substations, factory floors and renewable energy sites, with high IP ratings for durable protection.

Both the PA-450R and PA-410R models offer 5G-ready form factors with native 5G WAN uplink capabilities, making them ideal for distributed operations and remote site monitoring. The PA-410R features a DIN-rail mount for easy installation in industrial setups. Both models include a built-in modem with dual SIM support, simplifying deployment and saving space. This flexible and scalable suite of NGFWs is designed to effectively secure critical infrastructure and industrial assets.

 

Strengthen OT Monitoring and Compliance with Advanced Asset Discovery and Analytics

Strengthen visibility and simplify compliance reporting across your OT environment with the advanced asset discovery and analytics enhancements in our Industrial OT Security service. Our flexible asset discovery techniques, including both active and passive methods, as well as the Virtual Metadata Collector enable you to map all your assets, even in remote or hard-to-reach locations. With enriched OT asset contexts and advanced insights into Programmable Logic Controllers (PLCs), you gain granular visibility into asset behaviors and control systems, helping you detect vulnerabilities early and respond proactively.

To streamline compliance, our out-of-the-box NIST Cybersecurity Framework (CSF) compliance reporting reduces the time and effort required for audits, making adherence to industry standards more manageable. Seamless integrations with existing systems ensure these enhancements fit smoothly into your current infrastructure, enhancing efficiency without adding complexity.

OT-Specific Reference Architectures for Enhanced Security

We're also introducing new OT-specific reference architectures, complete with design and deployment guides. These include Securing OT Services Using an Industrial DMZ, which establishes best practices for creating a secure demilitarized zone in OT environments, and Securing OT Infrastructure with Plant Segmentation, which provides strategies for segmenting plant operations to enhance security and reduce risk.

Comprehensive Security for Every OT Environment

The Palo Alto Networks OT Security solution is built to protect every aspect of your OT  environment, from networks and assets to remote operations and 5G infrastructures. Tailored to meet the unique needs of OT systems, it empowers organizations to safeguard personnel, applications, devices and data. By delivering a consistent user experience across all deployments, this solution simplifies OT security management while ensuring robust protection for critical operations.

Join Us at the Industrial Control Systems (ICS) Cybersecurity Conference

Explore the future of OT security with us at Security Week’s ICS Cybersecurity Conference in Atlanta, Georgia, October 21st - 24th. Stop by our conference room or attend one of our expert-led sessions to gain insights into how we're advancing protection for critical industrial environments.

To see firsthand how these innovations can help you navigate the growing challenges of securing complex OT systems, start your free trial of Industrial OT Security today.

The post Safeguard OT Environments with the Power of Precision AI appeared first on Palo Alto Networks Blog.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

OT安全 工业安全 精准AI 虚拟补丁 远程访问
相关文章