Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Siemens Teams With Chronicle on Cybersecurity Solutions for Energy Industry

Siemens and Alphabet-owned cybersecurity firm Chronicle this week announced a partnership whose goal is to provide industrial monitoring and detection solutions for the energy sector.

Siemens and Alphabet-owned cybersecurity firm Chronicle this week announced a partnership whose goal is to provide industrial monitoring and detection solutions for the energy sector.

The combined offering, announced at Siemens’ Spotlight on Innovation conference, brings together Siemens cybersecurity expertise and Chronicle’s Backstory, a security telemetry platform that allows organizations to store and quickly analyze large amounts of data.

Siemens says Backstory will serve as the backbone of its managed services for monitoring hybrid and cloud environments. The combined solution is advertised as ideal for various types of organizations, including energy exploration and extraction, and power generation and delivery.

The German industrial giant pointed to one of its recent studies, which showed that while 60 percent of energy firms want to use analytics, only 20 percent are leveraging analytics for security monitoring in operational technology (OT) environments.

Learn More About Security Solutions for the Energy Sector at SecurityWeek’s 2019 ICS Cyber Security Conference

“The innovative partnership between Siemens and Chronicle demonstrates a new frontier in applying the power of security analytics to critical infrastructure that is increasingly dependent on digital technology,” said Leo Simonovich, Vice President and Global Head of Industrial Cyber and Digital Security at Siemens Gas and Power. “Cyber-attacks targeting energy companies have reached unprecedented speeds, and our cutting-edge managed service unlocks the analytics ecosystem offers a new level of protection from potential operational, business and safety losses.”

Recent studies have shown that cyberattacks against the energy sector are higher than average and this sector has been the target of several threat groups.

Related: CrowdStrike, Dragos Partner on ICS Security Services

Advertisement. Scroll to continue reading.

Related: Rockwell Automation Teams With Claroty on Industrial Network Security

Related: Schneider Electric Teams With Nozomi on Critical Infrastructure Security

Related: NIST Working on Industrial IoT Security Guide for Energy Companies

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.