Interview

The POWER Interview: How Unified Endpoint Management Can Help Secure the Power Grid

Digital technology poses critical challenges for the power sector. As the backbone of modern society, any disruption to power infrastructure can have far-reaching consequences. To learn steps leading power companies can take to protect their systems, POWER interviewed Apu Pavithran, founder and CEO of Hexnode. Hexnode’s award-winning Unified Endpoint Management (UEM) platform has empowered organizations in more than 100 countries with a centralized tool for enterprise-wide threat management. Pavithran offers valuable insight into how power companies can navigate the treacherous waters of cybersecurity, comply with stringent regulations, and effectively manage a diverse array of endpoints—from rugged field devices to critical infrastructure components.

1. Apu Pavithran is founder and CEO of Hexnode. Courtesy: Hexnode

POWER: What are the major challenges the power industry faces compared to other sectors, especially in the realm of device management?

Apu Pavithran: The power industry’s role as a linchpin of modern society means that it faces unique challenges, particularly in the realm of cybersecurity and device management. In the power sector, downtime can lead to widespread disruptions with severe societal impacts—it affects basically everything. Looking at examples like the Colonial Pipeline shows how a meager password could do unbelievable damage. This necessitates a robust and proactive approach to managing endpoints and ensuring the security of all devices.

However, modernizing such a critical infrastructure requires careful consideration, particularly when it comes to cybersecurity and device management. One of the foremost factors is the secure integration of digital technologies into existing power systems. With the increase in interconnected devices, networks, and systems, the attack surface expands, making the power sector more vulnerable to cyber threats. This is where Unified Endpoint Management (UEM) becomes crucial. UEM solutions allow power companies to manage and secure all endpoints from a centralized platform, ensuring that every end-user device connected to the network is compliant with security protocols and can be monitored and managed in real-time.

Interoperability is another crucial consideration. As new digital tools and technologies are introduced, they must seamlessly integrate with legacy systems without disrupting operations. UEM platforms facilitate this by providing a unified interface to manage all endpoints from modern mobile devices and legacy desktops to Internet of Things (IoT)-enabled devices. Furthermore, UEMs enable the rapid deployment of updates and patches across all devices, which is essential to maintaining security and operational continuity.

POWER: In the expanding landscape of endpoints in the industry, rugged devices have become increasingly prevalent. What challenges do these devices pose for management, and how can UEM solutions help ensure their security?

Pavithran: The deployment of rugged devices in the power industry is a strategic necessity, especially in field operations where environmental conditions are often harsh and unpredictable. While these devices are engineered to withstand physical stressors, their cybersecurity posture must be equally robust.

From the deployment of critical applications to tracking device compliance, location, or even battery status, UEM platforms offer a unified interface for managing rugged devices efficiently. In cases where mission-specific devices are needed, UEMs can also lock these devices into kiosks that fit their respective work roles. This level of oversight is essential for ensuring that devices remain operational and secure, even in challenging environments. Moreover, UEMs automate the deployment of security updates, ensuring that even devices in remote locations are consistently protected against emerging threats. This capability is crucial in the power industry, where the failure to promptly update devices could expose critical infrastructure to significant vulnerabilities.

Furthermore, if a device is compromised, UEMs offer the ability to remotely lock or wipe the device, preventing unauthorized access to sensitive data and minimizing the potential impact of a security incident. This level of control is crucial in the power industry, where rugged devices play a critical role in maintaining operational continuity.

POWER: Given the strict regulations governing the power industry, how can UEM solutions assist companies in meeting the ever-changing cybersecurity requirements?

Pavithran: Compliance in the power industry is not only a legal requirement, but also a critical component of operational integrity and cybersecurity. Given the highly regulated nature of this sector, companies must adhere to a complex landscape of standards and frameworks. The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards, ISO/IEC 27001, and the European Programme for Critical Infrastructure Protection (EPCIP) are a few of the various regional and national regulations present worldwide. Failure to comply can result in substantial fines, reputational damage, and, more critically, compromises in the security of critical infrastructure.

UEM solutions help power companies navigate this evolving regulatory landscape by managing and enforcing compliance policies across all devices and endpoints. For instance, ISO 27001 mandates certain management controls organizations must place on their endpoints. These vary from physical safety to encryption and incident response.

Additionally, UEM solutions offer comprehensive reporting capabilities, allowing power companies to generate detailed compliance reports that can be presented to regulatory bodies. This not only simplifies the audit process but also provides evidence of compliance in case of scrutiny or an incident. With UEM’s ability to deliver real-time monitoring and alerts, companies can quickly identify and rectify deviations, thus reducing the risk of non-compliance. With data privacy laws becoming increasingly stringent, adhering to regulations is more vital than ever.

POWER: With the growing risk of cyber threats to the energy sector, what are some effective strategies to safeguard power infrastructure?

Pavithran: While UEM solutions are essential for endpoint security, a comprehensive approach toward cybersecurity should prioritize a zero-trust model. This paradigm, increasingly recognized as a cornerstone of cybersecurity, is particularly crucial in the power sector due to the critical nature of its infrastructure. Given the critical nature of power infrastructure, the zero-trust approach, which operates on the principle of “never trust, always verify,” is particularly well-suited. The traditional approach of securing the perimeter and assuming everything inside the network is safe is no longer viable. Instead, zero-trust advocates for the continuous verification of the security status of every device, user, and network component before granting access. A core principle of Zero Trust Architecture (ZTA) is to view it as a comprehensive strategy rather than just a product. While tools like Identity and Access Management (IAM) and Zero Trust Network Access (ZTNA) are essential, every other solution should only be adopted after carefully considering what best aligns with your organization’s needs.

Considering the vast number of devices in today’s workplace, UEMs also have a role to play in this model. By providing granular control and visibility over endpoints, a UEM secures an organization’s devices and significantly contributes to the “never trust, always verify” principle. By enforcing stringent device health and compliance standards, UEMs ensure that only authorized and secure devices can access critical resources. Furthermore, they also mandate robust authentication through multi-factor authentication (MFA), safeguard sensitive data with strong encryption policies, and swiftly wipe compromised devices to prevent further damage. This proactive stance is essential in protecting the power grid from both external and internal threats.

Aaron Larson is POWER’s executive editor.

SHARE this article