Cyberbit Selected by Delek Pi Glilot to Protect Critical Infrastructure against Cyberattacks

Leading Israeli energy provider will deploy Cyberbit’s SCADAShield product for ICS/SCADA network security

Cyberbit, Elbit Systems' subsidiary, today announced that the leading energy company Delek Pi Glilot Limited Partnership has selected its SCADAShield solution to protect critical national assets against cyberattacks. The companies intend to expand their collaboration and leverage Cyberbit’s entire security portfolio to address Delek’s long-term cybersecurity strategy.

Critical national infrastructure is a prime target for cyber attackers. Industrial control networks employ unique, legacy devices and use proprietary ICS/SCADA protocols. Therefore, these networks require specialized security technologies. While several solutions have been developed to address these unique challenges, they all focus on the Operational Technology (OT) network and OT devices. However, OT networks and IT networks are converging. IT applications such as Human Machine Interfaces (HMIs) interconnect with OT devices and networks. Attackers take advantage of this vulnerability to initiate the attack in the IT network and use it as the gateway to the sensitive OT network. Through its SCADAShield product, Cyberbit provides multilayered IT and OT security that addresses this challenge to deliver fast and reliable detection of IT to OT attacks.

"Our infrastructure is becoming smarter and more connected, and with this change we must keep cybersecurity on the top of our mind," said Moshe Karadi, CEO of Delek Pi Glilot Limited Partnership. "With several Israeli security vendors operating in this space, Cyberbit proved to be the best suited partner, providing cutting edge, home-grown IT and OT security products and a rich product portfolio to cover our future cyber security strategy."

"Critical infrastructure organizations are beginning to realize that a SCADA security solution is only a fraction of the story,” said Adi Dar, CEO of Cyberbit. "Multi vector IT/OT attacks require a tightly integrated multi-layered solution and strategy, and I am happy to support Delek in driving this forward-thinking strategy within their organization."

 

img
Rare-earth elements between the United States of America and the People's Republic of China
The Eastern seas after Afghanistan: the UK and Australia come to the rescue of the United States in a clumsy way
The failure of the great games in Afghanistan from the 19th century to the present day
Russia, Turkey and United Arab Emirates. The intelligence services organize and investigate