Rapidly Improving Cyber Readiness for US Critical Infrastructure

With a Zero Trust, Defense-in-Depth Approach

Questions about the Critical Infrastructure Defense Project?

[email protected]

In response to the Russian invasion of Ukraine, national security experts have highlighted the increased risk of cyber attacks and have urged organizations to adopt a heightened cyber security posture. All organizations should be prepared for increasingly frequent and sophisticated attacks with goals that include stealing data, compromising applications, and shutting down networks and devices.

Free cyber security services and support for 4 months

To address this threat, leading Zero Trust cyber security providers have partnered to launch the Critical Infrastructure Defense Project. Our goal is to quickly improve the cyber readiness of vulnerable infrastructure in US critical industries—hospitals, energy utilities and water utilities—by providing eligible organizations free services and support.

The combination of cyber security capabilities offered by the project enables a robust Zero Trust defense-in-depth approach that can be implemented quickly.

Protecting US Critical Infrastructure with Zero Trust Cybersecurity
Hospital
Energy
Water

Zero Trust Providers Supporting the Critical Infrastructure Defense Project

Application and Network Security + Endpoint Security + Identity
Cloudflare logo

Cloudflare is offering 4 free months of these enterprise level services, plus support, to hospitals, energy utilities and water utilities:

  1. Secure DNS Filtering
  2. Secure Web Gateway
  3. Zero Trust Access Control
  4. Email Protection
  5. DNS Infrastructure
  6. WAF and DDoS Mitigation
CrowdStrike logo

CrowdStrike is offering 4 free months of these services, plus support, for hospitals, energy utilities and water utilities:

  1. Falcon Endpoint Protection Pro
  2. Falcon X Recon
Ping Identity logo

Ping Identity is offering 4 free months of these services, plus support, for hospitals, energy utilities and water utilities:

  1. Single sign-on
  2. Multi-factor authentication
  3. Risk management
  4. Orchestration