Additional information

Source: Web-site of vendor

The project has been delivered on schedule

The budget has not been exceeded

Functionality complies with task

Description

Enel improved the reliability, efficiency and cybersecurity of its power generation plants and networks in Italy. Working together, Enel and Nozomi Networks achieved substantial, measurable improvements in control network reliability, efficiency, and cybersecurity.

The Challenge: Enhancing Security Profile while Increasing Operational Efficiency


Electric energy operators around the world are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company that manages and monitors the Italian power grid.

This grid:
• Serves 31 million customers
• Has a net installed energy capacity exceeding 31 gigawatts
• Includes more than 500 power generation plants, including hydroelectric, thermoelectric, and wind
• Is managed and monitored by Enel 24/7/365
• Is operated by Terna, the Italian Transmission System Operator (TSO)

Enel is responsible for the availability of the grid’s underlying ICS and industrial network. It also manages Regional Control Centers and Interconnection Centers which connect with the TSO. The TSO manages the flow of energy to the grid plus controls and remotely regulates the power generation of power plants, increasing and decreasing power production as required. The complex system of interaction and cooperation between Enel and the TSO has strong security implications as well as operational and business challenges.

Enel’s Goals: Improved Efficiency, Reliability, and ICS Security


Initially Enel was using standard networking tools to manage, monitor and troubleshoot the ICS and the control network. However, operations were manual and time consuming. Information was difficult to gather and required human knowledge to be understood and correlated.
Enel wanted to improve efficiency as well as reliability and security with another approach. Plus, it required indepth support of SCADA protocol IEC 60870-5-104, used for power system monitoring and control and support for the security requirements of IEC 62351.

SCADAguardian: Proves its Value Throughout the Project Roll-Out

Working together, Enel and Nozomi Networks deployed SCADAguardian at one Regional Control Center first. Following extensive testing and fine-tuning the deployment proceeded to full-scale roll-out.
As a first step SCADAguardian probes were installed at all Regional Control Centers to monitor the Italian operational network. They were also installed at Interconnection Centers to monitor the connection between Enel and the TSO.
Next the SCADAguardian Central Management Console was installed to operate, monitor, and update the probes from a central control room.
Finally, SCADAguardian portable P500 appliances were introduced to monitor and analyze segments requiring investigation and troubleshooting.

The Results: Improved Productivity, Availability and Cyber Resiliency

Post deployment Enel uses Nozomi Networks’ solution to monitor, troubleshoot, and protect its industrial control network from a central location. Gathering information has become an automated process and one that delivers correlated and meaningful information. This has improved efficiency and allowed Enel’s staff to focus on protecting operations.

Tangible benefits include:
  • Full visibility and monitoring of the Enel control network. Includes sites at remote, isolated locations as well as the connections between Enel and the TSO.
  • Enhanced operational insight such as detecting misconfigurations, anomalous activities, critical states, and standard and advanced security attacks. Supervision utilizes in-depth understanding of Enel’s ICS and supported SCADA application level protocols such as IEC 60870-5-104.
  • Automatic real-time notification of industrial events of interest, including alerts triggered by customdesigned rules and constraints.
  • Traffic analysis for current and future investigations thanks to SCADAguardian’s unique features.

Details

Problems

No control over data access

Unauthorized access to corporate IT systems and data

Poor timing of management decision making

Risk or Leaks of confidential information

Low quality of customer service

Malware infection via Internet, email, storage devices

No monitoring of corporate IT processes

High costs of routine operations

Low employee productivity

Risk of data loss or damage

Business tasks

Reduce Costs

Enhance Staff Productivity

Ensure Security and Business Continuity

Improve Customer Service

Reduce Production Timelines

Support Decision Making

Manage Risks

Similar deployments

prev
next