HERA – The New Standard for Hardware-Enforced Remote Access
Software-Only Security is No Longer Enough
Every month, a new critical vulnerability is announced in major VPN and firewall providers. If your remote access relies entirely on software, you’re one stolen credential or zero-day exploit away from a total OT network compromise. As CISA recently warned, critical infrastructure requires something stronger than a password and an encrypted tunnel.
The Solution: Hardware-Enforced Remote Access (HERA)
In this exclusive technical deep dive, Waterfall Security experts – joined by industry veterans Jim McGlone (ASP) and Greg Hale (ISS Source) – unveil a paradigm shift in secure remote access.
What You Will Learn:
- Beyond the VPN: Why traditional software mediated access (Jump hosts, VPNs, Firewalls) fails against modern ransomware.
- The “Physics” of Security: How HERA’s hardware-based logic physically prevents attack propagation, even if credentials are stolen.
- Maintaining Operational Continuity: How to provide vendors and remote teams full-featured access (RDP, SSH, Web) without risking the OT network.
- Real-World Tactics: A roadmap for transitioning your critical sites to hardware-enforced protection.
Industrial networks are more connected than ever, making them “attractive targets” for nation-state actors and ransomware gangs. This session provides a practical, engineering-grade solution to the industry’s most pressing problem: How do we provide access without providing a path for an attack?
Originally recorded as a live launch event, this technical deep-dive remains the definitive guide to the architecture and hardware logic behind the HERA platform.
What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions?
How these attacks and risks are neutralized by hardware enforcement
How HERA contributes to strong OT network segmentation and physical segmentation requirements
Examples of how HERA can be used day-to-day in an industrial setting
Expert Panelists
Andrew Ginter
VP Industrial Security at Waterfall Security Solutions
Greg Hale
Editor/Founder at ISSSource and co-author of the annual Waterfall / ICS Strive Threat Report
Jim McGlone
CTO at Automation, Strategy & Performance and co-author of the highly-regarded Security PHA Review text
Share
Trending posts
Stay up to date
Subscribe to our blog and receive insights straight to your inbox