Attacks/Breaches
10/29/2013
03:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Waterfall Security Introduces FLIP And Modular Solutions, Expands Mission

Solutions highlight ways that Unidirectional Security Gateway technology can meet the needs of control system admins

New York – October 22, 2013 – Waterfall Security Solutions (Waterfall), which specializes in critical infrastructure and industrial control systems security, announced today the launch of two new technologies: the Waterfall FLIP&trade and the Waterfall Modular architecture. The technologies, in addition to the recently announced Waterfall for Bulk Electric System (BES) Control Centers solution, represent an expanded mission for the company: to replace control system firewalls with stronger alternatives. The solutions highlight the diverse ways that Unidirectional Security Gateway technology can meet the needs of control system administrators of power grids, oil and gas plants, water systems and pharmaceutical manufacturers. All three Waterfall products enable secure IT/OT integration and ensure the safety and reliability of critical control system networks, dramatically reducing the risk of a cyber attack occurring on critical infrastructure.

Waterfall's core technology is the Unidirectional Security Gateway that replicates servers reliably and in real time via hardware-enforced unidirectional communications. Waterfall FLIP&trade is a Unidirectional Security Gateway that temporarily reverses gateway orientation under the control of the protected network to allow occasional external inputs, such as production plans and equipment control schedules. Additionally, the Waterfall FLIP for Substations applies the FLIP technology to secure DNP3 protocol communications for high-voltage transmission substations. The new modular architecture reduces rack-spaces requirements for Unidirectional Security Gateway and FLIP solutions, and provides for end-user replacement and expansion of gateway equipment, without compromising security or enabling covert channels.

"Replacing control system firewalls with stronger technology that leverages Unidirectional Security Gateways will put critical infrastructures in a better position to face today's threat environment," said Andrew Ginter, Waterfall's vice president of industrial security. "Waterfall's new, expanded mission is to populate the spectrum of stronger-than-firewalls technologies and solutions."

Rounding out the trifecta of stronger-than-firewall technology is the Waterfall for BES Control Centers solution, which leverages hardware-enforced Unidirectional Security Gateways to replicate inter-control-center protocol (ICCP) servers in two directions, deployed as two completely independent communications channels. Since the gateways replicate ICCP servers instead of forwarding packets as firewalls do, the gateways do not suffer from the many, well-known vulnerabilities that plague firewalls.

Resource station:

· Articles, whitepapers & webinars: http://www.waterfall-security.ca/resources/

· Twitter: @WaterfallSecure - https://twitter.com/WaterfallSecure

· Facebook: https://www.facebook.com/pages/Waterfall-Security-Solutions/454902081249354

About Waterfall Security Solutions

Waterfall Security Solutions Ltd. is the leading provider of stronger-than-firewalls solutions for industrial control networks and critical infrastructures. The company's products are deployed in utilities and critical national infrastructures throughout North America, Europe, Asia and Israel. Waterfall's technologies reduce the cost and complexity of compliance with NERC-CIP, NRC, NIST, CFATS and other regulations, and include support for leading industrial applications, including the OSIsoft PI&trade Historian, the GE Proficy&trade iHistorian, Siemens SIMATIC&trade/Spectrum&trade solutions and GE OSM&trade remote monitoring platforms, as well as OPC, Modbus, DNP3, ICCP and other industrial protocols. Frost & Sullivan describe Waterfall's solutions as ensuring "optimum security for networks across user verticals" and awarded Waterfall the 2012 Network Security Award for Industrial Control Systems Entrepreneurial Company of the Year and the 2013 North America Award for Customer Value Enhancement. For more information, visit www.waterfall-security.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-1157
Published: 2015-05-27
CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2)...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?