GE Logo
category banner

Home > Services > Automation & Protection Services > Cyber Security Services

Cyber Security Services

In an ever-increasing connected world, the threats and impact from a cyber security attack is becoming more serious than ever before.  Having a security-oriented mindset is essential, especially when considering the capabilities and operation of your power system.   As an industry we must be able to manage cyber risks across a large installed base of varied aged assets that may or may not be able to meet today’s security challenges, while adhering to evolving regulatory requirements.

GE is your trusted partner to tackle the challenge of securing your network. Whether you are designing a new substation or maintaining an existing one, holistic approach across our products, systems and services work to help you substantially improve your network and reduce cyber security risks.

What we offer?
  • Assessment Assessment
  • Guidance Guidance
  • Sustainment Sustainment
  • Patch management Patch management
  • Solutions Solutions

Unique non-disruptive security assessments

 security assessments

Security assessments are fundamental in order to keep a system constantly secure. GE's Cyber Security Assessment service is the first step to establishing a cyber security improvement roadmap. The association of GE's deep expertise in its control system products and the domain knowledge ensures that the assessments are targeted, conducted effectively and results are accurate. These assessments help you and your plant operators and facilities managers identify, prioritize and remedy control system cyber security risks without impacting the reliability of your system.

BROCHURE
YOUR CUSTOMER ENGAGEMENT JOURNEY
Four Step Process to Optimize Cyber Security Posture Improvements Assess, Monitor, Design and Deploy

Our cyber security team works with you to identify the target outcomes in a security assessment workshop. The process starts with understanding the current situation, identifying threat scenarios, existing mitigation measures and risks. Risk reduction measures are then identified and grouped in a security roadmap. The solution can include various tools and processes focused on fast deployment and outage reduction. The system is then monitored for the system's life.

Contact Us