Expanding the range of Security Services,
Pronet has a wide and already built expertise on OT Security in cooperation with Claroty Platform and Services.Contact us
How does Pronet provides OT services?
Pronet delivers services using Claroty solutions. By using our tools and our processes will provide accurate asset inventories, coupled with strong processes for change management, completed with ready to use processes and procedures which are essential for long-term OT asset management.
In addition, the ability to monitor the network and report on unanticipated changes or anomalous behavior will be possible at any OT Level.
Our methodology includes the following steps:
OT in Shipping
IMO had recognized that a ship's onboard information technology and operational technology systems can be hacked just as easily as systems ashore, and that such security breaches have the potential to do considerable harm to the safety and security of ships, ports, marine facilities and other elements of the maritime transportation system. Apart from IT, OT and Critical Infrastructure have become major topics. Detailed information for the configuration and operation of a system is essential to detect anomalous or unusual behavior that could be an indication of an attack or possible compromise.
Products and technology that provide these capabilities must be justified based on solid business- and operations related criteria and implemented in a manner that complements normal operation of these systems.
Call us +30 212 222-9000
For any question or concern
And Solutions should also:
- Provide a graphical view of the environment, identifying the functional components and the pathways between them.
- Deliver a summary of system status, which includes the number of current and newly discovered assets, any potential anomalies and a traffic trend.
Pronet already has delivery of IT &OT solutions on both sea and shore, through which the company has developed the skills and methodologies to address the needs, mitigate the risks and safeguard vessels IT and OT systems.
Design and implement CTD
(site survey, tapping points selections, network preparedness, installation) with an aim to closely monitor the findings.
Assets, Access, Policies
We feed assets, access, policies and methodologies into the risk matrix.
Security Findings CTD
We evaluate our security findings coming from CTD and feed the risks.
We build our risk matrix and based on controls in place, we calculate residual risk and risk treatment plant.