Network Monitoring is Key for Public Power Utilities

public powerFrom data theft to phishing attacks, networks are constantly under siege by cyber criminals looking to exploit weaknesses in systems and networks. In some cases, organizations don’t realize their networks have already been breached, leaving the door open for further activity by malicious entities.
Network monitoring can provide key cybersecurity insights into your organization’s netflow activity and rapidly detect unusual behavior. CIS® (Center for Internet Security®) through its partnership with the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), offers a network monitoring solution called Albert to U.S. State, Local, Tribal, and Territorial (SLTT) organizations. Public universities, power utilities, law enforcement offices, and local government agencies are encouraged to take advantage of this low-cost solution.

Albert leverages a high-performance Intrusion Detection System (IDS) with thousands of signatures engineered to detect deviations from healthy network activity. For all data received by Albert sensors, CIS' 24x7 Security Operations Center (SOC) reviews any detected anomalies for malicious activity or data exfiltration and notifies the owner immediately if there are any concerns. Cybersecurity experts in our U.S.-based SOC, experienced with public power utility security services, are always available to help answer questions or provide additional remediation guidance.

CIS manages all network activity sensors deployed through Albert, including updates to the operating system, engine, netflow tools, and signature sets. Signatures are updated twice per day to ensure the most up-to-date security monitoring.


Available as a free download, the Albert overview details:

  • The netflow analysis process
  • How CIS acquires and develops signature sets
  • Pricing for SLTT entities
Learn more & download Albert overview


9 Security Resolutions for 2019

Ensuring continuity is essential for power and utility services. Security experts in this industry must…

Read More

How to Build a Cybersecurity Compliance Plan

Cybersecurity compliance can seem overwhelming at first. There is a multitude of standards, tools, and…

Read More

3 Steps to Infrastructure Security and Resiliency

November is Critical Infrastructure Security and Resilience Month. In this blog post, we’ll look into…

Read More
View All
Sign-up for
POWER Magazine's
Monthly e-Newsletter!
Email is required