Attacks/Breaches
10/29/2013
03:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Waterfall Security Introduces FLIP And Modular Solutions, Expands Mission

Solutions highlight ways that Unidirectional Security Gateway technology can meet the needs of control system admins

New York – October 22, 2013 – Waterfall Security Solutions (Waterfall), which specializes in critical infrastructure and industrial control systems security, announced today the launch of two new technologies: the Waterfall FLIP&trade and the Waterfall Modular architecture. The technologies, in addition to the recently announced Waterfall for Bulk Electric System (BES) Control Centers solution, represent an expanded mission for the company: to replace control system firewalls with stronger alternatives. The solutions highlight the diverse ways that Unidirectional Security Gateway technology can meet the needs of control system administrators of power grids, oil and gas plants, water systems and pharmaceutical manufacturers. All three Waterfall products enable secure IT/OT integration and ensure the safety and reliability of critical control system networks, dramatically reducing the risk of a cyber attack occurring on critical infrastructure.

Waterfall's core technology is the Unidirectional Security Gateway that replicates servers reliably and in real time via hardware-enforced unidirectional communications. Waterfall FLIP&trade is a Unidirectional Security Gateway that temporarily reverses gateway orientation under the control of the protected network to allow occasional external inputs, such as production plans and equipment control schedules. Additionally, the Waterfall FLIP for Substations applies the FLIP technology to secure DNP3 protocol communications for high-voltage transmission substations. The new modular architecture reduces rack-spaces requirements for Unidirectional Security Gateway and FLIP solutions, and provides for end-user replacement and expansion of gateway equipment, without compromising security or enabling covert channels.

"Replacing control system firewalls with stronger technology that leverages Unidirectional Security Gateways will put critical infrastructures in a better position to face today's threat environment," said Andrew Ginter, Waterfall's vice president of industrial security. "Waterfall's new, expanded mission is to populate the spectrum of stronger-than-firewalls technologies and solutions."

Rounding out the trifecta of stronger-than-firewall technology is the Waterfall for BES Control Centers solution, which leverages hardware-enforced Unidirectional Security Gateways to replicate inter-control-center protocol (ICCP) servers in two directions, deployed as two completely independent communications channels. Since the gateways replicate ICCP servers instead of forwarding packets as firewalls do, the gateways do not suffer from the many, well-known vulnerabilities that plague firewalls.

Resource station:

· Articles, whitepapers & webinars: http://www.waterfall-security.ca/resources/

· Twitter: @WaterfallSecure - https://twitter.com/WaterfallSecure

· Facebook: https://www.facebook.com/pages/Waterfall-Security-Solutions/454902081249354

About Waterfall Security Solutions

Waterfall Security Solutions Ltd. is the leading provider of stronger-than-firewalls solutions for industrial control networks and critical infrastructures. The company's products are deployed in utilities and critical national infrastructures throughout North America, Europe, Asia and Israel. Waterfall's technologies reduce the cost and complexity of compliance with NERC-CIP, NRC, NIST, CFATS and other regulations, and include support for leading industrial applications, including the OSIsoft PI&trade Historian, the GE Proficy&trade iHistorian, Siemens SIMATIC&trade/Spectrum&trade solutions and GE OSM&trade remote monitoring platforms, as well as OPC, Modbus, DNP3, ICCP and other industrial protocols. Frost & Sullivan describe Waterfall's solutions as ensuring "optimum security for networks across user verticals" and awarded Waterfall the 2012 Network Security Award for Industrial Control Systems Entrepreneurial Company of the Year and the 2013 North America Award for Customer Value Enhancement. For more information, visit www.waterfall-security.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

CVE-2014-7142
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?