PT Industrial Security Incident Manager
PT Industrial Security Incident Manager detects hacker attacks on ICS/SCADA systems and helps to investigate cybersecurity incidents at critical sites. Without interrupting normal operations, PT ISIM works in parallel to analyze a copy of network traffic, pinpoints relationships between security events, and shows easy-to-understand visualizations of potential attacks in the context of network topology and site layout.
Waterfall Unidirectional Security Gateways replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from attacks originating on external networks. Unidirectional Gateway solutions come in pairs: the TX appliance contains a laser, and the RX appliance contains an optical receiver. The Gateway pair can transmit information out of an operations network, but is incapable of propagating any virus, DOS attack, human error or any information at all back into the protected network.
Waterfall FLIP® securely integrates Information Technology (IT) and Operations Technology (OT) control system networks. Modern enterprises transmit control system information to business networks continuously, and need to send information from business networks into operations networks occasionally – for example when sending control recipes into batch manufacturing systems or when sending anti-virus signatures and other security updates.
The Waterfall Secure Bypass can be deployed in parallel with unidirectional solutions to enable full interactive remote access in emergencies. The secure bypass equipment can never be activated remotely by any network attack, however sophisticated the attack.
Unidirectional Cloud Connect
The Industrial Internet of Things (IIOT) promises revolutionary improvements in the efficiencies of industrial operations, manufacturing platforms, transportation systems, utilities and others. However, these benefits require the massive deployment of connected devices that gather and communicate data, thereby increasing cyber-security attack surfaces dramatically, and opening paths for attackers to enter industrial networks.
Upon discovery of a cyberattack, forensic experts look inside the compromised network’s various logs to locate and analyze tracks left by the attacker. Logs are the baseline information required for quality incident response and forensics. They consist of tracks and hints of the attack and the attacker. H
Unidirectional Security Gateway DIN Rail
In the face of increased and complex cyberattacks, more and more industrial and critical infrastructure sites are turning to unidirectional gateway technology to prevent remote cyberattacks from entering their control systems. However, many physical environments require a smaller form factor than the rack-mounted Unidirectional Security Gateway.