Webinar: HERA – Hardware-Enforced Remote Access
Watch now the webinar as we look at solutions that are enforced by dedicated hardware, and what benefits such solutions offer over comparable software-only solutions.
Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that are exploited routinely by sophisticated threat actors. In this webinar, we look at problems with and attacks that breach conventional “secure” remote access, and we introduce Waterfall’s HERA — Hardware-Enforced Remote Access. With a layer of hardware-enforced protection, in addition to layers of software protection, HERA represents a material improvement in the security of remote access systems for OT networks, even at unattended sites. With strong client protections, TPM support, session recording, moderated access, moderated sessions, zero trust controls, and many other powerful features, HERA opens up a new era for protected remote access to critical networks.
Please watch our webinar to learn about problems with “secure” remote access and a new, powerful capability for safer remote access to OT systems.
In this webinar, Andrew Ginter takes us through:
What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions? What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions? What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions?
How are these attacks and risks neutralized by hardware enforcement?
How can HERA contribute to strong OT network segmentation and physical segmentation requirements?
And examples of how Hardware Enforced Remote Access would be used day-to-day in an industrial setting.
About the Speaker
Andrew Ginter
VP Industrial Security at Waterfall Security Solutions
Greg Hale
Editor/Founder at ISSSource and co-author of the annual Waterfall / ICS Strive Threat Report
Jim McGlone
CTO at Automation, Strategy & Performance and co-author of the highly-regarded Security PHA Review text
Share
Trending posts
Insights into Nation State Threats – Podcast Episode 134
Infographic: Top 10 OT Cyberattacks of 2024
Andrew Ginter’s Top 3 Webinars of 2024
Stay up to date
Subscribe to our blog and receive insights straight to your inbox