Story image

Palo Alto Networks deploys next-gen security for King Country electricity provider

01 Mar 17

The King Country’s electricity distribution has just become more secure, after The Lines Company deployed Palo Alto Networks Next-Generation Security Platform as part of a massive upgrade to its IT infrastructure.

The company previously relied on hard-to-manage firewalls, which also failed to protect the utility from modern cyber threats. Palo Alto scanned the network in a proof-of-concept test and discovered more than 100 security infections, requiring more than 200 hours in staff time to remediate. 

When implementing Palo Alto’s technology, The Lines Company managed to reduce bandwidth consumption by 40% through URL Filtering, improve staff productivity and helped the company avoid $50,000 in software upgrades. 

The Lines Company also reduced the number of rules in its rule management system by 30% by using App-ID and User-ID technologies. 

Andy Simpson, Head of IT at The Lines Company, says the new visibility is ‘amazing’.    

“We have virtually eliminated security infections. Our security risk posture is ten fold what it was before we migrated to Palo Alto Networks. A combination of a great product coupled with an effective business partner, Network Service Providers, has allowed TLC to realise significant security and operational gains,” he says.

Palo Alto Networks deployed two next-generation firewalls in The Lines Company’s two data centres in a redundant position, allowing for high availability services to critical 0800 phone services and user services. Separate firewalls also protect the company’s SCADA network.

The Lines Company supplies power to homes and businesses in the King Country. It also owns and operates several hydro generation scenes, as well as an electrical contracting service.

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
GCSB welcomes Inspector-General's report on intelligence warrants
Intelligence warrants can include surveillance, private communications interception, searches of physical places and things, and the seizure of communications, information and things.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."