Attacks/Breaches
10/29/2013
03:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Waterfall Security Introduces FLIP And Modular Solutions, Expands Mission

Solutions highlight ways that Unidirectional Security Gateway technology can meet the needs of control system admins

New York – October 22, 2013 – Waterfall Security Solutions (Waterfall), which specializes in critical infrastructure and industrial control systems security, announced today the launch of two new technologies: the Waterfall FLIP&trade and the Waterfall Modular architecture. The technologies, in addition to the recently announced Waterfall for Bulk Electric System (BES) Control Centers solution, represent an expanded mission for the company: to replace control system firewalls with stronger alternatives. The solutions highlight the diverse ways that Unidirectional Security Gateway technology can meet the needs of control system administrators of power grids, oil and gas plants, water systems and pharmaceutical manufacturers. All three Waterfall products enable secure IT/OT integration and ensure the safety and reliability of critical control system networks, dramatically reducing the risk of a cyber attack occurring on critical infrastructure.

Waterfall's core technology is the Unidirectional Security Gateway that replicates servers reliably and in real time via hardware-enforced unidirectional communications. Waterfall FLIP&trade is a Unidirectional Security Gateway that temporarily reverses gateway orientation under the control of the protected network to allow occasional external inputs, such as production plans and equipment control schedules. Additionally, the Waterfall FLIP for Substations applies the FLIP technology to secure DNP3 protocol communications for high-voltage transmission substations. The new modular architecture reduces rack-spaces requirements for Unidirectional Security Gateway and FLIP solutions, and provides for end-user replacement and expansion of gateway equipment, without compromising security or enabling covert channels.

"Replacing control system firewalls with stronger technology that leverages Unidirectional Security Gateways will put critical infrastructures in a better position to face today's threat environment," said Andrew Ginter, Waterfall's vice president of industrial security. "Waterfall's new, expanded mission is to populate the spectrum of stronger-than-firewalls technologies and solutions."

Rounding out the trifecta of stronger-than-firewall technology is the Waterfall for BES Control Centers solution, which leverages hardware-enforced Unidirectional Security Gateways to replicate inter-control-center protocol (ICCP) servers in two directions, deployed as two completely independent communications channels. Since the gateways replicate ICCP servers instead of forwarding packets as firewalls do, the gateways do not suffer from the many, well-known vulnerabilities that plague firewalls.

Resource station:

· Articles, whitepapers & webinars: http://www.waterfall-security.ca/resources/

· Twitter: @WaterfallSecure - https://twitter.com/WaterfallSecure

· Facebook: https://www.facebook.com/pages/Waterfall-Security-Solutions/454902081249354

About Waterfall Security Solutions

Waterfall Security Solutions Ltd. is the leading provider of stronger-than-firewalls solutions for industrial control networks and critical infrastructures. The company's products are deployed in utilities and critical national infrastructures throughout North America, Europe, Asia and Israel. Waterfall's technologies reduce the cost and complexity of compliance with NERC-CIP, NRC, NIST, CFATS and other regulations, and include support for leading industrial applications, including the OSIsoft PI&trade Historian, the GE Proficy&trade iHistorian, Siemens SIMATIC&trade/Spectrum&trade solutions and GE OSM&trade remote monitoring platforms, as well as OPC, Modbus, DNP3, ICCP and other industrial protocols. Frost & Sullivan describe Waterfall's solutions as ensuring "optimum security for networks across user verticals" and awarded Waterfall the 2012 Network Security Award for Industrial Control Systems Entrepreneurial Company of the Year and the 2013 North America Award for Customer Value Enhancement. For more information, visit www.waterfall-security.com.

Comment  | 
Print  | 
More Insights
White Papers
More White Papers
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8370
Published: 2015-01-29
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.

CVE-2015-0236
Published: 2015-01-29
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.

CVE-2015-1043
Published: 2015-01-29
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.

CVE-2015-1044
Published: 2015-01-29
vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.

CVE-2015-1422
Published: 2015-01-29
Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, (9) jak_hookshow[], (10) j...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.