Seatrade Maritime is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Inmarsat enhance Fleet Secure cyber protection service

4df814832be98af9fc24ee47e85c79b6
Mobile telecoms body Inmarsat has enhanced its maritime cyber security service, Fleet Secure, with two new additions: intelligent endpoint security for onboard computers and a mobile training app for crew.

Fleet Secure Endpoint is described as a multi-layered endpoint security solution for ship operators. It is based on industry leading technology from ESET, a world leader in digital security, said Inmarsat, and powered by Port-IT and protects desktop computers and other systems connected to a vessel’s network.  
 
The new add-on to Fleet Secure has been developed to remove infections and thwart hackers before damage occurs to onboard endpoints and connected systems, explains Inmarsat. It will be available for commercial use from January 2019 and is compatible across Inmarsat’s maritime portfolio of services, including Fleet Xpress, FleetBroadband and Fleet One. 

Read more: Inmarsat unveils shipping’s first real-time cyber risk monitoring service

“It is a priority for every fleet operator and ship manager -  shore-side and at sea - to ensure their systems are properly protected,” said Inmarsat Maritime’s svp of Safety and Security, Peter Broadhurst. “As this enhancement to Fleet Secure demonstrates, Inmarsat is constantly monitoring the ever-changing cyber security landscape and devising new tools and approaches for addressing potential problems.” 

Inmarsat has also launched a training app for mobile devices, Fleet Secure Cyber Awareness, developed in association with Stapleton International and Marine Learning Alliance. The app is intended to enable seafarers to educate themselves on the tactics that cyber criminals might employ in attempting to infiltrate a company’s IT infrastructure.
 
“Many attempts to gain unauthorised access to IT infrastructure require some sort of activation by an end-user in order to infect a system and cause further damage,” said Broadhurst. “Crew education is therefore an indispensable component in realising a well-rounded security strategy.”