Industry-specific benchmarking reports built on years of in-depth industry data, collected using our innovative diagnostic programs. We aggregate the data across hundreds of IT departments in your industry to give you tailored vertical insights, all packaged in professional boardroom-ready reports.
Utilities Reference Architecture
Reference architectures built on years of industry expertise, honed by analysts working with real IT professionals in your industry. Leverage industry best practices so you don’t waste time and money reinventing the wheel.
Utilities Research Notes
Short, tailored research notes aimed at providing you with timely insights, relevant to your industry. Hot off the press, these notes will be published regularly and pair great with your morning coffee.
October 11, 2017
Telecoms are an attractive target to attackers – whether they know it or not. Board members can be a critical ally to the organization in getting cybersecurity strategies in place.
August 11, 2017
There is a lucrative bounty on the backs’ of utility organizations. The evolution of industrial control systems (ICS) has resulted in the emergence of digital automation, data accessibility, and consequently, various vulnerabilities. One successful breach from the wrong attack vector could have devastating repercussions, compromising the integrity of utility infrastructure nation-wide. The need for visibility into the threat landscape is more prominent now than ever; establish a threat intelligence function and improve your organizational situational awareness.
August 9, 2017
Safely pilot the capabilities of emerging Internet-of-Things (IoT) technologies in a highly secure and sensitive production environment. A quick win here will pave the way for making larger and more productive use of the technology.
July 19, 2017
A solar eclipse is an uncommon event that will have an impact on power delivery. But power utilities need to focus on preparing for more common, unpredictable outages instead of uncommon, predictable ones.
May 19, 2017
IT systems should reside in a business network. Operational technology (OT) should reside in an appropriately segregated process control network (PCN). Understand the unique challenges presented by modern networking capabilities and requirements, and establish a PCN with strong logical and physical network segregation from the business network.