Facilities

Cybersecurity for building automation – Building automation systems range from safety-critical to reliability critical: elevator controls must be protected from cyber sabotage, heating, ventilation and air conditioning (HVAC) systems must run and we cannot afford misoperation of HVAC systems that leads to equipment damage and long-term outages. 

With Waterfall you get

Integration

Secure Remote Access

Waterfall’s HERA® , Hardware-Enforced Remote Access, provides the functionality of remote access, without the inherent risks and threats that come with network connectivity. 

Monitoring

Real-time security monitoring

Real time visibility into networks and building automation security configurations through Unidirectional Gateways increases protection for critical systems, without creating connections, and the cyber risks that come with connections, into protected systems to gather security data.

Safe Equipment

Safe Equipment Monitoring

Enterprise-wide and visibility into equipment availability, new equipment issues and developing problems through Unidirectional Gateways enable safe and efficient prioritization and scheduling of maintenance activities.

Use cases

Remote Access

Hardware Enforced Remote Access (HERA® ) enables remote management, updates, and troubleshooting for OT networks, safely. When software-based secure remote access is too great a risk, HERA® ‘s hardware provides remote functionality without the risks of remote connectivity. 

Equipment Monitoring

Unidirectional Gateways offer unbreachable protection to critical equipment, while replicating OPC servers, real-time databases, Syslog alerts, SNMP alerts and other critical performance indicators to enterprise systems and users, and external vendors and service providers.

Passenger Monitoring

Video feeds, turstile counters and other data is routinely replicated unidirectionally to IT networks to provide insights into passenger traffic patterns and bottlenecks, passenger safety issues and real-time rail / bus and shuttle scheduling.

How it works

Group 1117

Connect

An industrial network safely to an IT network

Group 1117-1

Protect

The industrial network with hardware enforced technology

Group 1117-2

Replicate

Real-time operational servers to the enterprise IT network

Related resources

Books and eBooks

BMS Use-Case eBook: Impenetrable Cyber Defense for Data Center Infrastructure

This eBook explores the best-practices for protecting the BMS (Building Management System) from internet-based cyberattacks and similar threats. Get your copy today...
Blog

The Art of AI-Generated OT Payloads: From Mischief to Existential Threat

Almost 10 years ago, I managed to take control of every appliance in a 200-room hotel. I could raise the blinds in each room, change the TV channels, adjust the outside lighting, modify the temperature settings, and more. I had complete control. In the years since, to my surprise, the number one question I was asked wasn't "How did you do it?" but rather "With the control you had, what's the worst thing you could have done?"...
Podcast

Their Own Rail System, Water Treatment, and More | Episode 128

Airports are like small cities. Eric Vautier, CISO of all 3 Paris airports looks at WHAT is an airport and how are thousands of airports changing their cybersecurity because of NIS2 and the regulatory environment.​...

Consult with a unidirectional
solutions architect