Executive Summary

With more than 100 years of legacy, the European division of this multinational metal beverage and food cans manufacturer have more than 18+ plants. The client had challenges with lack of visibility and information on plant network and shop floor assets.

Business Challenge

  • More than 200 OT assets on the shopfloor with communication network of more than 35 different-unsecured protocols
  • Challenging to have end-to-end visibility and mapping of plant network
  • Ineffective management of security updates and patches
  • Many connected assets were declared end-of-life by respective OEMs, introducing serious security vulnerabilities

Business Challenge

  • More than 200 OT assets on the shopfloor with communication network of more than 35 different-unsecured protocols
  • Challenging to have end-to-end visibility and mapping of plant network
  • Ineffective management of security updates and patches
  • Many connected assets were declared end-of-life by respective OEMs, introducing serious security vulnerabilities

Our Solution

  • Structured approach included evaluation of different OT systems, devices and networks, along with compliance of specific standards and regulations
  • The evaluation was done using Claroty platform to identify the OT assets and network components.
  • Using the Claroty identified vulnerability and threats to OT network and assets
  • Evaluated potential impact and prioritized the recommendation for quick and smooth upgradation of OT assets, network switches, PLC & HMI firmware and security patches

Key Results And Benefits

  • Asset Hardening: Addressing the issues of common vulnerability exploits and blocking of unwanted ports
  • Network Architecture: Introduced Network Segmentation, Purdue Model, Deep Packet Inspection, Intrusion and Anomalies Detection
  • Threat Monitoring: Configured Continuous Threat Monitoring, New Generation Firewall, OT Traffic Mirroring and Antivirus
  • Access Control: Defined secured rules-based Access Control & Strategy, Remote User Session with Authentication
  • Secured Remote Access: Prevent un-authorized access using VPN, multifactor authentication, and endpoint protection
  • Incident Response: Help identify and mitigate incidents to minimize impact and maintain the availability & reliability of critical infrastructure
  • Disaster Recovery: Focus to minimize downtime, data loss, and impact to physical assets to maintain the integrity and availability of OT operations in case of cyber disaster

Download This Case Study

1 Step 1
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right
FormCraft - WordPress form builder

About ITC Infotech

ITC Infotech is a leading global technology services and solutions provider, led by Business and Technology Consulting. ITC Infotech provides business-friendly solutions to help clients succeed and be future-ready, by seamlessly bringing together digital expertise, strong industry specific alliances and the unique ability to leverage deep domain expertise from ITC Group businesses. The company provides technology solutions and services to enterprises across industries such as Banking & Financial Services, Healthcare, Manufacturing, Consumer Goods, Travel and Hospitality, through a combination of traditional and newer business models, as a long-term sustainable partner.

ITC Infotech is a wholly owned subsidiary of ITC Ltd. ITC is one of India’s leading private sector companies and a diversified conglomerate with businesses spanning Consumer Goods, Hotels, Paperboards and Packaging, Agri Business and Information Technology.

Read More About ITC Infotech