Intellitactics Releases NERC Compliance ToolIntellitactics Releases NERC Compliance Tool
Intellitactics SAFE automates tasks required to comply with regulatory standards, such as log collection, storage, compliance reports, and event detection
April 29, 2009
Reston, VA, April 28 , 2009—Intellitactics, a global provider of security information and event management (SIEM) solutions for every enterprise budget, announced availability of Intellitactics SAFE LP to enable everyday compliance with NERC CIP standards. Intellitactics SAFE (SAFE) automates the tasks required to comply with regulatory standards: log collection, storage, compliance reports and event detection to mitigate risk. In addition to audit worthy reports SAFE's event explorer provides instant access to logs and events to improve understanding and accelerate investigation of control violations most likely to put critical infrastructure at risk. SAFE is one energy efficient appliance, capable of organizing logs and notifying operators and security analysts of control violations or anomalies that put the enterprise at risk.
Sunil Bhargava, CTO, Intellitactics explains the benefits of SAFE: "The NERC CIP standards, like PCI, HIPAA, SOX and others, provide a guidance for strengthening security and protecting mission critical infrastructures . In fact, bulk electric entities must be in compliance with these standards by the end of June 2009. Intellitactics' utility customers use the SAFE LP appliance as a foundation for complying with information security related standards for all their compliance initiatives " not just NERC. Without spending more they're able to use SAFE's easy to use the reports and event monitoring capability to automate the daily tasks required to be secure and compliant every day. NERC focused reports are easily accessed from the navigation tree - along with PCI, SOX and other compliance related reports."
"New guidance from NERC has prudently suggested that entities within the bulk power system take a new and comprehensive look at which assets are deemed to be critical, and at the methodologies used to determine the risks from cyber crime and cyber terrorism," said Derek E. Brink, vice president and research fellow for IT Security, Aberdeen Group. "SIEM solutions can be especially helpful in correlating information and events to increase visibility across these highly interconnected systems, and in understanding the potential impact of compromise of these critical assets."
Pam Casale, Chief Marketing Officer Intellitactics describes pragmatic approach to NERC compliance, "Recent headlines reflect the criminal efforts of cyber spies who are allegedly targeting utilities and threatening the availability of the national power grid. NERC provides guidance in many areas and the SAFE appliances provide a centerpiece to the overall information security plan. SAFE provides scalable, world-class event monitoring and correlation used to proactively stop these threats and protect this critical information infrastructure."
The primary objective for NERC standards is to ensure the reliability of the bulk power system in North America. These standards include critical cyber asset identification, security management controls, personnel and training, electronic security perimeters, physical security of critical cyber assets, systems security management, incident reporting and response planning and recovery plans for critical cyber assets. Non-compliance with NERC standards can result in fines as high as $1 million per day per violation, based on incident severity and a number of risk factors. Many leading utilities are using Intellitactics to secure their power generation and transmission infrastructure against growing global cyber threats.
Intellitactics SAFE automates the tasks of everyday compliance. Compliance with industry/ regulatory standards or internal policies, depends on an organization's ability to enforce data security policies with information security controls. SAFE verifies and validates that controls put in place to enforce policies are working. SAFE automates the everyday compliance tasks like log acquisition, review, analysis, notification and reporting. SAFE transforms ambiguous logs into easy to understand security events. All the data is normalized, meaning that unlike logs can be combined for reporting, dashboards and charts. Intellitactics has tailored SAFE to offer a fully capable data security management solution on one right-sized SAFE appliance. See for yourself how SAFE simplifies compliance and security.
To learn more about everyday comopliance with NERC standards and audit worthy reports visit www.intellitactics.com.
About Intellitactics, Inc. Headquartered in Reston, VA, Intellitactics provides a suite of complementary security incident and event management (SIEM) products for organizations of all sizes. Well-known as the provider of Intellitactics Security Manager, the optimal enterprise security management solution, to the largest organizations in the world, Intellitactics has expanded its product leadership with a line of security management appliances, Intellitactics SAFE. The combination of the appliances and software products underscores Intellitactics product leadership in providing solutions for log management, compliance, threat management and incident response to every organization regardless of size or purchasing power. By combining any of the products of the suite, global organizations can effectively distribute SIEM capabilities outside headquarters. Intellitactics was awarded Common Criteria Certification in December 2004, making it the first software provider to earn this certification as a security information and event management solution. Founded in 1996, Intellitactics is backed by JMI Equity Fund LP and Lazard Technology Partners and is ranked by well-known industry analysts as a market leader known for product development, delivery and thought leadership. Visit us at www.intellitactics.com.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper