Cyber security for oil & gas

  • Home
  • Cyber security for oil & gas
Cyber security for oil & gas
Cyber security for oil & gas
Cyber security for oil & gas
Cyber security for oil & gas
blob blob blob bg-img

Problem statement

The industrial and manufacturing industry is the one of the most targeted sectors for cybercrime, together with finance and government sectors.
According to IBM and the Ponemon Institute,
the average cost of a data breach
in the industrial sector is above
$ 4 000 000
Cyberattacks can range from causing minor production disruption to inflicting serious damage to machinery.

PUBLIC CASES

Oil tanking and Mabanaft (Germany)

company-logo
Disruption of supply chains, conflict with Shell

Sea-Invest (Global)

company-logo
Shutdown of terminals around the World

Saudi Aramco (KSA)

company-logo
Data leak and an attempt to extort $50 million

Colonial Pipeline (US)

company-logo
Complete shutdown for 5 days +
Joe Biden announcement

RISK OVERVIEW

Potential Damage

potential damage
Disturbance
of technological (production) process
potential damage
Theft of intellectual property
potential damage
Catastrophic downtime
of infrastructure
potential damage
Extortion of funds
potential damage
Physical damage
potential damage
Confidential information leakage
blob glass

Our Solution

How it works

On the basis of a single centralized platform, "traps" are created - digital twins of real devices that initiate the connection of cyberattacks to themselves, protecting the organization's real services.

Purpose

  • Verification and analysis of collected artifacts
  • Interaction with the attacker and collection of information
  • Monitoring of cyberattacks on any type of digital twins
  • Blocking the spread of cyber attacks in IT infrastructure
  • Information Security Alert
solution

Deployment

arrows
arrows

Solutions for industrial sector

FV-DECEPTION system for monitoring and blocking cyberattacks on any type of device in the IT infrastructure.

How it works

  • Detect connections to traps that simulate real enterprise services
  • Promptly notify security officers about the fact of an attack in real time
  • Interaction with the attacker in order to gather as much information about him as possible

Purpose

  • Traps can imitate any IT infrastructure objects: WEB server, FTP server, E-mail server, Workplace, Firewall, OS, Router, Switch, IoT / IIoT equipment, etc.
  • The elements (sensors) are deployed on each company network (VLAN) and connected to the management module
  • Each element (sensor) deploys a set of traps corresponding to real devices, computers and services on the network
  • An additional important feature of the system is the built-in vulnerability scanner. Each element (sensor) in the system can scan its network for vulnerabilities.

Scheme of work

scheme

Sensors

Sensors are located in subnets (VLANs), they scan and deploy traps.
The following information can be obtained for each sensor in the system:
honeypot Bait at users' workplaces
web Traps that are installed in the subnet
pc Devices that were fixed at the time of the last scan
sensors

Let’s talk about how can help you securely advance.

Get A Free Quote
Cyber security for oil & gas
Cyber security for oil & gas