Inmarsat enhances cyber security offering for Maritime industry
Inmarsat has introduced two new components to its maritime cyber security service, Fleet Secure, as it continues to develop solutions that combat ever-increasing cyber threats faced by ship owners and ship managers.
Vessel operators will benefit from a powerful, multi-layered endpoint security solution, Fleet Secure Endpoint, which is based on industry leading technology from ESET, a world leader in digital security, and powered by Port-IT and protects desktop computers and other systems connected to a vessel’s network.
Fleet Secure Endpoint has been developed to remove infections and thwart hackers before damage occurs to onboard endpoints and connected systems. The solution will be available for commercial use from January 2019 and is compatible across Inmarsat’s maritime portfolio of services, including Fleet Xpress, FleetBroadband and Fleet One. It also complements the resilience of Inmarsat’s own satellite and ground network enabling consistent cybersecurity standards to be maintained.
Peter Broadhurst, SVP of Safety and Security for Inmarsat Maritime said: “It is a priority for every fleet operator and ship manager – shore-side and at sea – to ensure their systems are properly protected. As this enhancement to Fleet Secure demonstrates, Inmarsat is constantly monitoring the ever changing cyber security landscape and devising new tools and approaches for addressing potential problems; ensuring that ships and their crew remain safe –physically and virtually.”
Inmarsat has also launched a training app for mobile devices, Fleet Secure Cyber Awareness. This enables seafarers to educate themselves on the tactics that cyber criminals might employ in attempting to infiltrate a company’s IT infrastructure.
Addressing the human element is essential to maintaining a strong security posture, says Mr Broadhurst: “Many attempts to gain unauthorised access to IT infrastructure require some sort of activation by an end-user in order to infect a system and cause further damage. These attacks are often heavily disguised so as to trick and manipulate end-users into unwittingly granting permission.
“However, there are nearly always tell-tale signs that, if spotted in time, would prevent escalation. Crew education is therefore an indispensable component in realising a well-rounded security strategy and the reason behind teaming up with Stapleton International and Marine Learning Alliance to launch our Fleet Secure Cyber Awareness module.”
Fleet Secure Endpoint
Fleet Secure Endpoint is powered by Port-IT who has fine-tuned ESET Endpoint Security, an award-winning cyber-resilience solution, which, by employing machine learning to detect unusual or suspicious behaviour, is engineered to defend against known and unknown threats at any point in the malware lifecycle.
In addition, ship owners and managers benefit from services such as two-way firewall, protection against botnets, built-in ransomware prevention, web-based remote monitoring of network traffic (with granular reporting down to individual PC), as well as proven anti-spyware and anti-phishing tools and support for virtualisation.
Fleet Secure Cyber Awareness
Fleet Secure Cyber Awareness delivers seafarers with effective cyber security training aimed at preventing threats from escalating into full-blown cyber-attacks.
Available through Google Play and Apple’s App Store, the app can be downloaded and installed on seafarers’ smartphones or tablet devices before they join a ship. It was purposely designed in partnership with Stapleton International, the University of Sunderland and the Marine Learning Alliance to be self-contained and work offline, removing the need to consume vessel bandwidth.
The app comprises three core modules that enlighten seafarers to digital threats from different perspectives. The first educates on cyber threats that involve taking advantage of personal information; the second focuses on cyber threats that exploit weaknesses in IT devices; while the third covers the physical and human dimension of more sophisticated cyber-attacks. In addition to the detailed training materials, the app includes a competency test to help seafarers consolidate and assess their understanding of the issue. On successful completion of the test seafarers will be eligible for CPD credits from IMarEST and a University certificate of completion.
Industry: Cyber Security News
- SOC Manager. SC Clearance. Immediate opportunity.
Permanent SOC Manager. SC cleared / clearable, London / Birmingham. SOC Manager needed to replace a SOC contractor I placed into a client who is due to complete their assignment at the end of March. The ability to achieve SC clearance is essential. Looking for someone that is a blend of strategic stakeholder engagement with strong technical skills. The role will sit in a relatively new SOC environment. The position is to setup, implementation and management of resources to help with the initial and on-going stages of a new SOC. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-manager-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- Security engineer. Financial Services. UK. Permanent
CH7863 Security engineer. End User . Financial Services Security Engineer needed to monitor and manage a security suite of tools within an End User environment. The Security Engiener will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
- DevSecOps - Security design / review consultant. SC Clearance. London
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.