sb-as logo
Story image

Quann & Claroty strengthen Singapore's critical infrastructure security

20 Sep 2017

Managed security services provider Quann will take on Singapore’s critical infrastructure security in partnership with Claroty.

The two companies will work together to build an advanced operational technology (OT) security solution to address challenges that Singapore’s critical information infrastructures face day-to-day.

“This partnership has been in stealth mode for over a year as we have been building up our joint capabilities and carrying out trials for key customers. It brings together one of the best-in-class OT solution providers with a leading MSSP,” comments Quann’s managing director Foo Siang-tse.

The partnership also aligns with the Singapore government’s Smart Nation vision. The partnership will secure control systems – the backbone of critical infrastructures such as transport, water, communications and power.

 The OT risk is the next biggest security challenge that will face organisations going forward. CIIs are typically very secure from a physical perspective but there often are vulnerabilities in both the IT and OT domain. There will be real-world consequences when there are OT breaches,” Foo Siang-tse says.

Quann’s OT solution is powered by Claroty and can deep dive into complex multi-vendor OT environments, get full visibility to all assets, traffic and legitimate behaviour. It can also uncover hidden issues.

The company says that traditional IT security requires an ‘active’ footprint on a network, which can disrupt operations. Quann opted for a passive monitoring approach that inspects traffic without disrupting availability and operation of OT systems.

The system also generates alerts that enable security and plant teams to respond to threats and control remote access.

“OT facilities, such as energy plants, typically run on legacy systems and thus have naturally become easy targets to cyber terrorists and hackers. There is a common misconception that air gapping is the panacea to OT security issues. The reality is that air-gaps can be compromised for a variety of operational reasons,” Foo says.

Claroty’s VP of worldwide sales, Colin Blou, says his company is pleased to be working with Quann.

“Claroty is proud to partner with Quann on this very important effort to drive improved security for Singapore’s critical infrastructure. We believe that there is no more important mission in cyber security today than securing the control system networks that run the world. We believe the threat is growing and Claroty is committed to working with top tier partners such as Quann to drive rapid innovation and sustained risk reduction in this space,” he says.

Foo adds that organisations are only as secure as their weakest link.

“The biggest risk today is that facilities are secured in silo, i.e., the physical, IT and OT domain are protected differently and separately. Just as perpetrators will take a holistic view to seek out vulnerabilities, security defence teams need to adopt a similar whole-of-organisation approach to total security.  Enterprises are truly secure only if they are cyber secure.”

Story image
Oracle combines cloud automation with comms security in new solution
The Oracle Communications Security Shield (OCSS) Cloud is built on the company’s cloud infrastructure, and uses AI and real-time enforcement to combat the heightened risk of infrastructure attacks presented to contact centres and enterprises.More
Story image
Inteview: Mimecast security expert on why email attacks are more successful than ever
Techday spoke to Mimecast Australia principal technical consultant Garrett O’Hara, who walks through why security experts are becoming increasingly pessimistic about email-borne attacks.More
Story image
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.More
Story image
The 5 most common multi-factor authentication (MFA) methods
While MFA is ubiquitous, it’s far from perfect – whether you’re the business or the end-user. Here are the 5 most common MFA methods, and where each of them falls short. More
Download image
NFV touted as go-to method of simplifying corporate networks
Enterprises outline their considerations in this study, built on evidence from those directly involved with building a strong networking infrastructure.More
Story image
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.More