Process Engineering White Papers

on 'Physical Security'

1-8 of 8 < first | prev | next | last >
  • Eastman Deploys ProjectWise to Drive Collaboration, Greater Efficiency, and Cost Savings

    Eastman Chemicals, one of the world’s largest chemical companies, recently decided to strengthen their information security and reliability, as well as develop a path forward to lower software maintenance costs. This Case Study shows how Eastman achieved their goals by globally standardizing on Bentley's ProjectWise software in order to replace an aging, but critical, in-house records management system. The ProjectWise solution has enabled Eastman to significantly reduce their IT costs, and is helping them achieve greater security of their vital plant information while providing a modern data-centric environment to move beyond engineering records into asset performance improvement.

    Download the white paper now.

    Bentley
    04/14/2015
  • Application Whitelisting: Extend Your Security Arsenal

    As the security threat landscape continues to evolve, so must your response. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, application whitelisting can be an important addition to your security arsenal.

    Honeywell
    09/21/2012
  • Surviving the CFATS Site Security Plan – Tips for Inspection and Resubmission

    As the Department of Homeland Security (DHS) moves forward with the Chemical Facility Anti-Terrorism Standards (CFATS), the program continues to evolve. This white paper describes the ongoing CFATS compliance process (which is a combination of technical, procedural, and personnel security) and also provides insight regarding how to develop or revise a comprehensive Site Security Plan (SSP) and prepare for a CFATS Authorization Inspection (AI). Recommendations are relevant to SSPs for all tier levels and should be considered for a facility's initial SSP submission and/or any required SSP resubmission. Download this white paper now: Tips for Inspection and Resubmission.

    Tyco Integrated Security
    07/25/2012
  • The 7 Steps to ICS and SCADA Security

    The past two years have been a real wakeup call for the industrial automation industry. For the first time ever it has been the target of sophisticated cyber attacks like Stuxnet, Night Dragon and Duqu.

    In addition, an unprecedented number of security vulnerabilities have been exposed in industrial control products and regulatory agencies are demanding compliance to complex and confusing regulations. Cyber security has quickly become a serious issue for professionals in the process and critical infrastructure industries.

    If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices.

    In order to provide you with guidance in this area, Tofino Security and exida Consulting LLC have condensed material from numerous industry standards and best practice documents. They also combined experience in assessing the security of dozens of industrial control systems.

    The result is an easy-to-follow 7-step process.

    Tofino Security and exida Consulting LLC
    02/28/2012
  • White Paper: Ten Tips for Completing a Site Security Plan

    Working on your Site Security Plan (SSP)? The next stage in the Chemical Facility Anti-Terrorism Standards (CFATS) compliance process requires covered facilities to submit a SSP. Given the importance of the SSP, covered facilities should address a number of factors while they complete this step in the CFATS regulation. Download this complimentary whitepaper now: Ten Tips for Completing your SSP.

    Tyco Integrated Security
    03/10/2010
  • Security vulnerability assessment revealed

    Plant security is a key priority at many plants. This 10-page paper provides background what the methodology for a plant vulnerability analysis involves. It covers topics such as how to get started, available tools, and risk assessment.

    ioMosiac
    04/21/2005
  • Security Vulnerability Analysis

    Plant security is a key priority at many plants. This 10-page paper provides background what the methodology for a plant vulnerability analysis involves. It covers topics such as how to get started, available tools, and risk assessment.

    12/02/2004
  • Application of Fingerprints to Increase Security

    This 9-page paper summarizes the various applications and benefits of the use of fingerprints to restrict access to information and transactions. It covers access via the Internet and other networks as well as physical access.

    10/15/2004
1-8 of 8 < first | prev | next | last >