Hardware-Enforced Remote Access (HERA) – Under the Hood
Waterfall’s HERA is a true interactive OT remote access with unidirectional protection for OT. How does it work?
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
Waterfall’s HERA is a true interactive OT remote access with unidirectional protection for OT. How does it work?
Remote access for OT is vital for maintaining efficiencies, troubleshooting, and is also important for retaining remote workers. But most remote access solutions pose a range of security risks. We introduce HERA – Hardware-Enforced Remote Access – as a safer alternative.
It turns out that there are really only three ways that ransomware can shut down OT networks and physical operations: “abundance of caution” shutdowns, OT dependencies on IT systems and services, and ransomware impacting OT networks and systems directly.
For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.
What happens when we close the loop in mining operations? How can we prevent Internet-exposed services being compromised?
Engineers have very recently started to use the “OT” term, primarily when interacting with enterprise security teams. Engineers use the term to refer to the computers and networks that control important, complex, and often dangerous physical processes
Governments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement.
Industrial network engineers have always been uneasy with the task of “protecting information”. The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.
The fundamental difference between these two kinds of networks is consequences: most often, the worst-case consequences of cyber attacks are sharply, qualitatively different on IT vs OT networks…
Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data centers are essential to uptime – electric power systems, backup power, fire suppression, physical access control, cooling and more.