Cybersecurity

Cybersecurity Lifecycle Services

Dedicated cybersecurity support from experts in industrial control systems (ICSs) and operational technology (OT), tailored to your needs.

There is no one-size-fits-all approach to OT cybersecurity. Whether you want help managing the security of your SEL-designed and commissioned OT system or want to maximize your cybersecurity effectiveness with sophisticated planning and response, we have a service package that meets your stage of the cybersecurity lifecycle. And with our experienced security staff carrying as much of the load as you need, your teams can be free to do what they do best: keep your systems up and running.

Cyber Maintenance

Complement your operations and maintenance program with experienced cyber support.

With our cyber maintenance service offerings, we provide ongoing support for ICS and OT systems designed and commissioned by SEL.

These services include the ongoing support and maintenance of your system through any of the following:

  • Patch requirement management
  • Software update management
  • Software and firmware upgrade notifications
  • Software enhancement guidance to optimize system efficacy and resiliency
  • Periodic access log, system log, and security alert review
  • Device backup
  • Server and workstation health reviews
  • Vulnerability assessments to uncover security weaknesses
  • System capacity analysis to determine scalability for future resource needs
  • End-of-life monitoring for firmware and hardware

Cyber Monitoring

Improve asset visibility and threat detection with expert monitoring from OT and ICS engineers.

With our cyber monitoring services, we provide security support to monitor your network, whether your system was designed by us or another security vendor. In this service package, our analysts fulfill the role of a full-time internal security analyst. This includes monitoring your network for suspicious activity, alerting you to any findings, and regularly reporting on network threats and activity.

Cyber Readiness and Response

Maximize your security effectiveness with proactive planning and response.

Strategic planning is essential to combat cyber threats. With our cyber readiness and response services, engineers with unmatched expertise in a variety of ICS and OT environments can proactively assess and test your systems to strengthen your cybersecurity posture. And if a security event does occur, we can help minimize the impact and return to normal operation quickly.

Our proactive service offerings include:

Architecture review—Evaluate your OT infrastructure to identify potential weakness and recommend improvements.

Compromise assessment—Assess whether your systems and networks have been compromised by a threat actor, and if so, determine the extent.

Crown jewel analysis—Designate which assets within a system are most critical, then evaluate the risks and generate a risk management plan for them.

Cybersecurity program maturity assessment—Evaluate the effectiveness of your cybersecurity program to identify potential gaps and recommend improvements.

Firewall audit—Evaluate the effectiveness of your organization’s firewall configuration, and identify any issues that may compromise security.

Incident response plan development and review—Develop and maintain a comprehensive incident response plan to protect your systems and data; minimize the impact of any incidents that do occur; and respond most effectively to emerging threats.

Incident response readiness assessment—Evaluate your preparedness for security incidents or breaches by identifying gaps in security capability and recommending improvements to them.

Penetration test—Identify vulnerabilities and weaknesses in the security of your systems and networks by simulating an attack, then evaluate the effectiveness of existing security controls.

Tabletop exercise—Simulate a security event to test your incident response in a controlled environment, and identify areas of improvement.

Threat hunt—Proactively identify and investigate potential security threats that may have evaded detection by traditional security controls.

Vulnerability assessment—Identify potential security flaws in your systems and network.

Questions? Contact Us!

An SEL representative will follow up with you directly. We’re happy to answer all your questions and help you find the best solution for your needs.

Unbeatable Support

SEL support teams are stationed in regional offices around the world and staffed with application engineers who are experts in our products and in power system applications.

Technical support for SEL-manufactured devices is always free. No matter how often you need to call or how long your SEL products have been in service, you’ll reach an SEL expert who can provide the service and support you need.

Our cybersecurity team is always ready with the information and resources needed to keep your OT networks and critical systems secure and working effectively. Cyber services support contracts can include incident response, audits, system hardening, and more, depending on your anticipated needs.

More about SEL warranty and support