ECI Telecom Muse MCSS
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

High costs of IT personnel

Shortage of inhouse IT engineers

Values

Enhance Staff Productivity

Reduce Costs

ECI Telecom Muse MCSS

ECI is a global provider of ELASTIC Network solutions to CSPs, critical infrastructures as well as data center operators

Description

Critical infrastructures (CI) are a prime target for cyber-attacks. National security administrations say that attacks like the Ukraine power grid strike should be a “wake-up call” for CI organizations. Proper protection is a particularly complex matter. It must defend both information and operational technologies (IT/OT), and also must be able to discern tangible threats from a multitude of reported events. ECI’s Muse cyber security suite meets these challenges and more. Why ECI?
  • Prevents Attacks
  •  

  • Detects Real Threats
  •  

  • Guards The Security
  •  

  • Cost Effective
  •  

Based on two complementary subsystems, Muse provides a holistic cyber security for power utilities that facilitated NERC CIPv5 standards compliance. Muse Shield unifies multiple cyber security functions into a consolidated form factorand prevents IT and OT cyber-attacks at the communications point-of-access to any facility before they can cause harm. SHIELD incorporates:
  • Best-of-breed SCADA protection and anomaly detection against zero-days attacks and site infiltration
  •  

  • A secure gateway that includes a next gen firewall and applications control to segregate OT networks and prevent attacks propagation
  •  

  • L2/L3 encryption against man-in-the-middle attacks
  •  

Muse Compass is an intelligent, centralized system that eliminates the guesswork in identifying and managing CI cyber security threats. Compass collects, validates, correlatesd and analyzes information from IT and OT cyber security systems and sensors, and prevents threat insights in a visually intuitive actionable manner. Shield feeds Compass with events, logs and Deep Packet Inspection (DPI) information. In return, Compass directs Shield policies. Together they provide a rich set of tools to facilitate complying with NERC cyber security standards, or those from others regulatory bodies.

Scheme of work

 Scheme of work