• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IEC Protects Internal Systems with Valid Authentication

    July 16, 2013 Alex Woodie

    When it comes to security, there are few groups who take it quite as seriously as the Israelis. And when it came to protecting the systems that control the country’s electric grid, it’s notable that the Israel Electric Corp. (IEC) is using Valid Technologies IBM i-based VSSA technology to provide strong biometric authentication.

    The principals were not willing to part with much information about the IEC implementation, which Valid Tech announced back in 2009. That’s not surprising, as secrecy is one of the primary tenants of security. “Loose lips sink ships,” after all. But what has been disclosed paints a picture of an organization that has gone to great measures to protect the security of its critical infrastructure.

    Because of the politics of the Middle East, Israel’s neighbors don’t share electricity with the nation. As a result, Israel’s state-owned electric company, IEC, built its own isolated electric grid. The grid is composed of 17 power stations, nearly 200 switching stations and substations, and generates and distributes about 12,000 megawatts of electricity across the nation.

    Security has always been important to electric grid operators, but the threats have evolved in recent years. Ten years ago, the idea that a cyber attack could disable or destroy a core piece of national infrastructure such as an electric grid was not talked about openly.

    Today, such warnings are common place. Cyber security experts today often publicly warn nations about the need to take action and bolster defenses against hackers, terrorists, rouge states, and nationally backed cyber warriors. In the U.S. this is one of the rationales behind upgrading older electric grids to new “smart” grids that are not as susceptible to cascading failures as today’s100-year-old grids are.

    IEC’s headquarters in Haifa, Israel. The 30-story office building is the 13th tallest building in the country. (Source: Sambach).

    The potential for a cyber attack to inflict harm on industrial systems was made evident with the 2010 Stuxnet attack on the Iranian nuclear centrifuges. That attack, which is thought to be the work of the U.S. and Israel governments, utilized a Windows-based worm to wreak havoc on Siemens programmable logic controllers, and is said to have set back the Iranians nuclear weapon program by years.

    Such cyber attacks cut both ways, of course, and the IEC has undoubtedly warded off attempts to infiltrate its internal control systems and damage the grid. Obviously, the IEC won’t discuss in detail the measures it has taken to block such attacks. But we do know at least one component of its internal security system: the IBM i-based Valid Secure System Authentication (VSSA).

    IEC uses VSSA coupled with fingerprint scanners to prevent unauthorized access to its internal control systems. Any engineers or other IEC employee who needs to log onto the computers that control the grid must first have their fingerprints authenticated by VSSA.

    What’s notable about the installation is that IEC was not a big user of IBM i servers before the VSSA implementation, if it was an IBM i user at all (it’s not clear if it was an IBM i user before the Valid deal). The utility bought a pair of IBM i servers for the express purpose of using them to run VSSA and to provide an important level of protection for critical systems.

    That’s a big vote of confidence in the VSSA product, and a big plus mark in favor of Valid, which can provide authentication for any type of server or application, not just those running on IBM i.

    “The way I talk about the VSSA product is it’s the equivalent of middleware that makes it possible for business logic programmers to enable biometric authentication without having to know anything about the details of biometrics,” Valid president Pat Botz told IT Jungle recently. “I think that’s probably what initially drew the IEC in. They looked at it, and thought ‘Great, we don’t have to become biometric authentication experts.'”

    RELATED STORIES

    IBM i Security Firm Looks To Mobile Biometrics For Growth

    Apple’s AuthenTec Buy Validates Biometrics, Valid Tech Says

    Valid and TGS Gang Up on Buddy Punchers

    Valid Gets IBM Certification for i OS-Based Biometric System

    Bank’s Approach to Biometric Authentication a ‘Valid’ One

    Pat Townsend to Resell Valid’s i5/OS Biometric Authentication

    Valid Tech Assimilates Biometric Authentication Into the Enterprise

    IBM Debuts New Password Reset, Synchronization Software

    Valid Tech Delivers Biometric Authentication Solution for OS/400

    Identity Management Comes to Forefront as Data Losses Mount



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Linoma Software:  FREE Webinar: Conquer Compliance Requirements. July 18.
    Cybernetics:  Ditch the tape backup? Up to 4.3 TB/hr! Start saving now!
    Abacus Solutions:  Qualified IBM i users eligible for free pair of running shoes

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Two Decades Later, Microsoft Looks Like Big Blue Of Days Gone By IBM’s Systems Biz Returns To Profitability In Q2

    Leave a Reply Cancel reply

Volume 13, Number 20 -- July 16, 2013
THIS ISSUE SPONSORED BY:

Profound Logic Software
Abacus Solutions
Townsend Security
Shield Advanced Solutions
Cybernetics

Table of Contents

  • Curbstone Revamps Card Payment Software to Avoid PCI Exposure
  • Infor Gives BI Tool the 10x Treatment
  • IEC Protects Internal Systems with Valid Authentication
  • Spinnaker Nabs More JD Edwards Customers, Unveils Siebel Support Service
  • Townsend Gets VMware Certification for Encryption Key Manager
  • Brooks Revs RPM to Bolster Production Printing
  • Wayne Madden Hooks Up with iFD to Sell TEMBO Database Tools
  • ERP Vendors Delivering Better Value, Nucleus Says
  • Informatica Embeds PowerCenter into Zettaset’s Hadoop Software
  • Liaison Grows EDI VAN Services Business, Thanks to VAN Consolidator

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle