Home Transient Cyber Assets

TRANSIENT CYBER ASSETS (TCA)

Transient Cyber Assets (TCA) are vulnerable not only to software creep but also to cyber attack. They may have malicious code running in the background that is tasked to scour the network and infect additional systems. Our solution protects these assets by deploying a Gold image on a monthly basis. This gold image is updated to include OEM specific security patches and applicable OS/Software/Device drivers.


GOLD IMAGE BUILD

FoxGuard Solutions will download OEM specific security patches and applicable OS/Software/Device drives for the Transient Cyber Assets (TCA) laptops. We will roll patches into TCA laptop Gold image during this phase to create a new version of the TCA laptop Gold Image for a total of 24 monthly patching cycles.

PATCH AVAILABILITY REPORTING
FoxGuard will provide intelligence reports that track the release of cyber security patches specific to your TCA laptop.

SOFTWARE CHECK SUM
We will verify the validity of all software by checking each software package against the vendor’s listed check sum. If check sums are available from the software vendor then the task will be completed and documented. All Check Sums will be documented to assist with NERC-CIP 013 – Supply Chain.

ANTI-VIRUS SIGNATURES
We will consolidate and deploy the Anti-Virus signatures using customer specified software as part of this program. The AV signatures will be compiled from the vendor and deployed as part of this program for 24 monthly patching cycles.

TESTING
We will do a functionality test for each patch deployment Gold Image to consist of
       • Boot Testing of the OS
       • Testing that each OEM software application successfully executes and runs.

Any patch that causes a test to fail or that has an adverse effect will be documented and removed from
that months release cycle and placed in a Not Deployed status. OEM software in a Not Deployed status will be kept as the last working revision of the software. You will then be able to work with your OEM vendor to address each issue in the Not Deployed List at your convenience.

ENCRYPTION
All laptop images will be encrypted upon request.

VULNERABILITY SCAN
Twice per year we will test each Gold Image Laptop by running a vulnerability scan against it and corresponding documentation will be provided. User will receive the report and best determine how to address all vulnerabilities. This option is available upon request at an additional cost.

SECURE TRANSFER
All deliverables will be hashed by FoxGuard and a testable by the user.

 

Learn More About Our Transient Cyber Solution

If you would like our security experts to contact you, then kindly share your contact details and a brief summary of your challenges.  

Talk to an Expert