Attacks/Breaches
10/29/2013
03:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Waterfall Security Introduces FLIP And Modular Solutions, Expands Mission

Solutions highlight ways that Unidirectional Security Gateway technology can meet the needs of control system admins

New York – October 22, 2013 – Waterfall Security Solutions (Waterfall), which specializes in critical infrastructure and industrial control systems security, announced today the launch of two new technologies: the Waterfall FLIP&trade and the Waterfall Modular architecture. The technologies, in addition to the recently announced Waterfall for Bulk Electric System (BES) Control Centers solution, represent an expanded mission for the company: to replace control system firewalls with stronger alternatives. The solutions highlight the diverse ways that Unidirectional Security Gateway technology can meet the needs of control system administrators of power grids, oil and gas plants, water systems and pharmaceutical manufacturers. All three Waterfall products enable secure IT/OT integration and ensure the safety and reliability of critical control system networks, dramatically reducing the risk of a cyber attack occurring on critical infrastructure.

Waterfall's core technology is the Unidirectional Security Gateway that replicates servers reliably and in real time via hardware-enforced unidirectional communications. Waterfall FLIP&trade is a Unidirectional Security Gateway that temporarily reverses gateway orientation under the control of the protected network to allow occasional external inputs, such as production plans and equipment control schedules. Additionally, the Waterfall FLIP for Substations applies the FLIP technology to secure DNP3 protocol communications for high-voltage transmission substations. The new modular architecture reduces rack-spaces requirements for Unidirectional Security Gateway and FLIP solutions, and provides for end-user replacement and expansion of gateway equipment, without compromising security or enabling covert channels.

"Replacing control system firewalls with stronger technology that leverages Unidirectional Security Gateways will put critical infrastructures in a better position to face today's threat environment," said Andrew Ginter, Waterfall's vice president of industrial security. "Waterfall's new, expanded mission is to populate the spectrum of stronger-than-firewalls technologies and solutions."

Rounding out the trifecta of stronger-than-firewall technology is the Waterfall for BES Control Centers solution, which leverages hardware-enforced Unidirectional Security Gateways to replicate inter-control-center protocol (ICCP) servers in two directions, deployed as two completely independent communications channels. Since the gateways replicate ICCP servers instead of forwarding packets as firewalls do, the gateways do not suffer from the many, well-known vulnerabilities that plague firewalls.

Resource station:

· Articles, whitepapers & webinars: http://www.waterfall-security.ca/resources/

· Twitter: @WaterfallSecure - https://twitter.com/WaterfallSecure

· Facebook: https://www.facebook.com/pages/Waterfall-Security-Solutions/454902081249354

About Waterfall Security Solutions

Waterfall Security Solutions Ltd. is the leading provider of stronger-than-firewalls solutions for industrial control networks and critical infrastructures. The company's products are deployed in utilities and critical national infrastructures throughout North America, Europe, Asia and Israel. Waterfall's technologies reduce the cost and complexity of compliance with NERC-CIP, NRC, NIST, CFATS and other regulations, and include support for leading industrial applications, including the OSIsoft PI&trade Historian, the GE Proficy&trade iHistorian, Siemens SIMATIC&trade/Spectrum&trade solutions and GE OSM&trade remote monitoring platforms, as well as OPC, Modbus, DNP3, ICCP and other industrial protocols. Frost & Sullivan describe Waterfall's solutions as ensuring "optimum security for networks across user verticals" and awarded Waterfall the 2012 Network Security Award for Industrial Control Systems Entrepreneurial Company of the Year and the 2013 North America Award for Customer Value Enhancement. For more information, visit www.waterfall-security.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

CVE-2014-6395
Published: 2014-12-19
Heap-based buffer overflow in the dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap before 8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted password length value that is inconsistent with the actual length of the password...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.