facility security – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Thu, 03 Apr 2025 14:02:49 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png facility security – Waterfall Security Solutions https://waterfall-security.com 32 32 Securing Data Center OT Networks  https://waterfall-security.com/ot-insights-center/facilities/securing-data-center-ot-networks/ Tue, 05 Sep 2023 14:25:37 +0000 https://waterfall-security.com/?p=9844 What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities, and what are the consequences of their vulnerabilities?

The post Securing Data Center OT Networks  appeared first on Waterfall Security Solutions.

]]>

Securing Data Center OT Networks 

What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities, and what are the consequences of their vulnerabilities?
Picture of Waterfall team

Waterfall team

Securing Data Center OT Networks

What are data center OT networks? 

Data center OT networks and systems are specialized industrial control systems that manage the physical infrastructure and systems throughout a data center. They enable real-time control and monitoring of critical functions such as power distribution, cooling, physical and access control. These OT networks are ideally isolated from IT networks to maximize security, rely on specialized OT communications protocols and often have redundant systems to ensure reliability and resilience.  

How are data center OT networks different from other OT networks? 

Data center OT networks differ from other OT networks in that many other OT systems operate critical industrial infrastructures. Data centers are generally not considered industrial infrastructure, but critical information infrastructures. In both kinds of infrastructure, yes, worker safety comes first – especially in the parts of the data center dealing with high voltage electricity or fire suppression. In data centers however, worker safety concerns and risks are more contained than in industrial infrastructures, and the big priority is the reliability of data center functions – the functions providing the informational infrastructure.  

When it comes to data centers, uptime is a very important key performance indicator.  

Data Center Cyber Risks 

When it comes to data centers, uptime is a very important key performance indicator (KPI).  

Let’s look at major infrastructure components in data centers and how they can impact uptime: 

BMS (Building Management System): 

The BMS plays a critical role in monitoring and controlling various aspects of the data center’s physical environment, such as temperature, humidity, and airflow. Cyber risks related to the BMS can include unauthorized access, manipulation, or disruption of the system. Attackers might exploit vulnerabilities in the BMS software or hardware to gain control of critical infrastructure, potentially leading to data center downtime or equipment damage. Additionally, if the BMS is integrated with other systems, such as fire suppression or access control, compromising the BMS could have cascading effects on overall data center security and even worker safety. 

EMS (Electrical Management System): 

The EMS manages the electrical distribution and power systems in the data center. Cyber risks in the EMS can lead to power-related issues, such as disruptions to Uninterruptible Power Supplies (UPS) or failures in power distribution. Attackers could exploit weaknesses in the EMS to cause power outages, leading to data loss, service interruptions, and potential electrical hardware damage that could lead to much longer term outages. Moreover, unauthorized access to the EMS might enable attackers to manipulate power settings, increasing the rate of wear on computer components and increasing the rate of transient “glitch” style outages among computers in the data center. 

 SEC (Security Management): 

The SEC is responsible for maintaining the data center’s overall physical security posture, including access controls, video surveillance, and threat detection. Cyber risks in the SEC can result in intruders gaining unauthorized physical access to critical areas, and cyber attackers tampering with security systems, or disabling surveillance mechanisms. Moreover, if the security systems are interconnected with other data center components, an attack on the SEC might be used as a gateway for further infiltration. 

DCIM (Data Center Infrastructure Management): 

The DCIM plays an important role for optimizing the management systems of data centers. With a wide suite of tools, DCIMs empower data center administrators to monitor, analyze, and control every aspect of their facility’s infrastructure from power and cooling systems to server utilization and asset tracking. By providing real-time insights and predictive analytics, DCIM improves operational efficiency and also contributes to substantial cost savings and environmental sustainability. Any possibility of a breach into the DCIM represents a very high risk for the data center, because the DCIM controls so much. A compromised DCIM can be used to shut down the entire center, for example. 

Bottom Line:  

Overall, the interconnected nature of data center systems increases the risk of cyber attacks affecting multiple components simultaneously. To mitigate these risks, data center operators must implement a really robust cybersecurity measures, such fully segmenting OT networks from IT and updating or patching the OT systems very cautiously, after thorough testing, to minimize the risk of unexpected downtime of OT computers and the physical and electrical processes essential to data center operations. Additionally, data centers require access controls that can’t be breached.  

By having a secure OT network, data centers can significantly enhance their resilience against cyber threats, ensuring they maintain the uptime goals they strive to achieve. 

Want to learn how Waterfall Security helps protect data center OT? Read our case study Cybersecurity for Data Centers with a real-world example of a data center in the Asian-Pacific region.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Securing Data Center OT Networks  appeared first on Waterfall Security Solutions.

]]>
Enabling The Smart Airport https://waterfall-security.com/ot-insights-center/transportation/enabling-the-smart-airport/ Tue, 23 May 2017 08:34:00 +0000 https://waterfall-security.com/?p=10331 Enabling real-time visibility of operational data while protecting ATC, runway operations & safety, baggage handling & cargo systems and flight information display systems from outside cyber threats.

The post Enabling The Smart Airport appeared first on Waterfall Security Solutions.

]]>

Enabling The Smart Airport

Protecting Airport Infrastructure From Evolving Cyber Threats
Enabling The Smart Airport
Customer/ Partner:

A Major European International Airport Hub.

Customer Requirement:

Enable real-time visibility of operational data while protecting ATC, runway operations and safety, baggage handling and cargo systems and flight information display systems from threats emanating from the interconnection of these systems to less-trusted IT networks.

Waterfall’s Unidirectional Solution:

Secure the operational network perimeter from external threats and provide real-time enterprise monitoring – Unidirectional Security Gateways protect all operational systems with an impassable physical barrier to external network threats.

Unidirectional Network Protection For Airport Infrastructure

Cyber attacks on civil airport systems and infrastructures can lead to catastrophic consequences. Airports rely on SCADA and industrial control systems for utilities, baggage systems, radar systems, runway operations and safety systems for safe and reliable passenger travel. Waterfall Unidirectional Security Gateways and related products replace firewalls on industrial networks to enable safe IT/OT integration while physically preventing online and remote attacks on airport operations networks.

The Challenge icon
The challenge

To protect safe, reliable and continuous operation of airport infrastructure operational systems and safety networks from cyber threats emanating from less trusted IT networks and the Internet. At the same time provide realtime access to operational data for the airport enterprise and the public, as well as periodic and on-demand inbound access for updates and vendors.

Waterfall solution - icon
Waterfall solution

A Waterfall Unidirectional Gateway provides safe IT/OT integration, connecting the operations control system network to the Enterprise network. The gateway replicates process historian and Syslog servers from the control network to the enterprise network. Enterprise clients interact normally and bi-directionally with these replicas in real- time. A Waterfall FLIP, a hardware-enforced Unidirectional Security Gateway whose orientation is reversible, permits disciplined, scheduled updates of operations systems. By schedule, or by exception, an independent control mechanism triggers the FLIP hardware to change orientation, allowing specific updates to flow back into the protected control system network as needed.

Results and benefits - icon
Results & benefits

100% Security: Having replaced the IT/ OT firewall with hardware-enforced physical protection in the form of a Unidirectional Gateway and a FLIP, airport control networks are now physically protected from online attacks originating on IT, Internet or other external networks.

100% Visibility: Existing airport systems continue to operate normally. Instead of accessing servers on the critical operational network through a vulnerable firewall, users on the enterprise network now access realtime data from the replica process historian for all informational and security requirements.

100% Compliance: This architecture facilitates compliance with even the most rigorous industrial cybersecurity standards and regulations, world-wide.

vertical red line
Theory of Operation
Click to enlarge

Waterfall Unidirectional Security Gateways replace firewalls in industrial network environments, providing absolute protection to control systems and industrial control networks from attacks emanating from external less-trusted networks. Unidirectional Gateways contain both hardware and software components. The hardware components include a TX Module, containing a fiber-optic transmitter/laser, and an RX Module, containing an optical receiver, but no laser. The gateway hardware can transmit information from an industrial network to an external network, but is physically incapable of propagating any virus, DOS attack, human error or any cyber attack at all back into the protected industrial network. The Gateways enable vendor monitoring, industrial cloud services, and visibility into operations for modern enterprises and customers. Unidirectional Gateways replicate servers, emulate industrial devices and translate industrial data to cloud formats. As a result, Unidirectional Gateway technology represents a plug-and-play replacement for firewalls, without the vulnerabilities and maintenance issues that accompany firewall deployments.

Global Certifications And Compliance

Certified: Common Criteria EAL 4+, ANSSI CSPN, NITES Singapore

Assessed by: US DHS SCADA Security Test Bed & Japanese Control Systems Security Center Bed, Idaho National Labs, Digital Bond Labs, GE Bently Nevada Systems Labs, and NISA Israel

Complies with: Global ICS Standards & Regulations, Single European Sky (SESAR), NERC CIP, IEC 62443, NRC 5.71, NIST 800-82r2, CFATS, ISO, IIC SF, ANSSI, and many more

vertical red line
Unidirectional Security Gateways Benefits:

arrow red rightSafe, real-time continuous monitoring of airport critical infrastructure and operational control systems

arrow red rightAbsolute protection from remote attack consequences, including unscheduled downtime, equipment damage and threats to workers, and public safety

arrow red rightSimplified audits, change reviews, and security system documentation

arrow red rightReal-time process historian server data and functionality are available to business network users and applications

arrow red rightDisciplined, on-demand and scheduled updates of airport systems, without the vulnerabilities that always accompany firewall deployments

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Enabling The Smart Airport appeared first on Waterfall Security Solutions.

]]>
Cybersecurity In Gaming https://waterfall-security.com/ot-insights-center/facilities/cybersecurity-in-gaming/ Sat, 08 Apr 2017 09:03:00 +0000 https://waterfall-security.com/?p=10421 Securing operational monitoring of several enclaves of control-system networks and securing integration with an enterprise SIEM.

The post Cybersecurity In Gaming appeared first on Waterfall Security Solutions.

]]>

Cybersecurity In Gaming

Protecting Operational Networks In The Gaming Industry From Evolving Cyber Threats
Cybersecurity In Gaming
Customer/ Partner:

North American-based global gaming and hospitality corporation.

Customer Requirement:

Enable safe and secure monitoring of several enclaves of control-system networks as well as secure integration with an enterprise SIEM.

Waterfall’s Unidirectional Solution:

Secures both the control system network perimeter from external threats with Unidirectional Security Gateways, enabling safe ICS network monitoring from a central enterprise SIEM.

The Gaming Industry Is Facing Modern Cyber Threats

With the global casino gaming industry yielding over $100 billion US per year, casinos and hotels in global gaming hubs have become prime targets for cybercriminals. A successful attack could hold gaming infrastructure hostage, costing an entertainment firm tens of millions of dollars per day in lost revenues.

The Challenge icon
The challenge

To enable monitoring of different enclaves of operations networks and building systems and without posing risk to the operational networks, and in turn enable a central enterprise SIEM to receive alerts from the operational network intrusion detection system sensors without compromising the operational network.

Waterfall solution - icon
Waterfall solution

Waterfall integrated network intrusion detection security technology with Unidirectional Gateways to provide centralized cross-network monitoring and threat detection, without risk to industrial networks. With Unidirectional Gateways replicating network traffic to the IDS system on the IT side, the enterprise system can include operational network traffic and equipment status in enterprisewide monitoring, analysis and threat detection.

Each separate operation network PLC with an IT/OT interconnection was separated with a Unidirectional Gateway at the interface boundary.

Results and benefits - icon
Results & benefits

Security: A Unidirectional Gateway replicating network to an external IT network provides strong assurance that no attack from the IT network can enter the operational network.

Flexibility: Unidirectional Gateways enable IDS sensors to be deployed on IT networks. Sensors on IT networks are more easily accessed, updated, and managed than those deployed inside ICS networks.

Performance: Deploying IDS sensors on IT networks means that those sensors can use the full power of the IT network to communicate with a central SOC during security emergencies.

vertical red line
Theory of Operation
Click to enlarge

Waterfall Unidirectional Security Gateways replace firewalls in industrial network environments, providing absolute protection to control systems and industrial control networks from attacks emanating from external less-trusted networks. Waterfall Gateways contain both hardware and software components. The hardware components include a TX Module, containing a fiber-optic transmitter/ laser, and an RX Module, containing an optical receiver, but no laser. The gateway hardware can transmit information from an industrial network to an external network but is physically incapable of propagating any virus, DOS attack, human error, or any cyber attack at all back into the protected industrial network.

The gateways enable control-system intrusion detection, vendor monitoring, industrial cloud services, and visibility into operations for modern enterprises and customers. Unidirectional Gateways replicate servers, emulate industrial devices and translate industrial data to cloud formats. Unidirectional Gateway technology represents a plug-and-play replacement for firewalls, without the vulnerabilities and maintenance issues that accompany firewall deployments

vertical red line
Unidirectional Security Gateways Benefits:

arrow red rightSafe monitoring of control system networks from intrusion detection sensors

arrow red rightSafe, continuous monitoring of control system intrusion detection sensors from IT networks and central SOCs

arrow red rightSafe remote supervision of changes to protected systems

arrow red rightSafe cloud vendor supply chain integration

vertical red line
Global Cybersecurity Standards Recommend Unidirectional Security Gateways

Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites across the globe. The enhanced level of protection provided by Waterfall’s Unidirectional Security Gateway technology is recognized as best practice by leading industry standards bodies and authorities such as NIST, ANSSI, NERC CIP, the ISA, the US DHS, ENISA and many more.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Cybersecurity In Gaming appeared first on Waterfall Security Solutions.

]]>