Make my forensic records tamper-proof
Modern cyber attacks will often erase or tamper with logs and other security record-keeping in order to hide their activity and especially to hide their origins. If incident response teams cannot determine how an attack occurred, there is a big risk of the attack recurring the moment a system is restored to normal operations.
Waterfall protects against such threats with a tamper-proof repository that keeps a unidirectional copy of the logs.
With Waterfall you get
Waterfall's BlackBox gathers logs, configuration files and other information and sends it through Unidirectional Gateway hardware into a forensic repository. No TCP connection or other remote-control attack can penetrate the hardware to put forensic records at risk.
Incident responders at site can physically connect to the BlackBox system and access a reliable forensic record. Comparing records in the forensic repository to logs and other configurations at site identifies which records attackers modified and can suggest which kinds of information the attackers were most interested in hiding.
PLC and other automation system configuration files and other important records can easily be dragged and dropped into the BlackBox repository. Remote control attacks cannot tamper with these backups. The BlackBox provides incident respons teams with knows-good backups to work from when restoring industrial systems.
Hardware protection
Waterfall's BlackBox gathers logs, configuration files and other information and sends it through Unidirectional Gateway hardware into a forensic repository. No TCP connection or other remote-control attack can penetrate the hardware to put forensic records at risk.
Reliable records
Incident responders at site can physically connect to the BlackBox system and access a reliable forensic record. Comparing records in the forensic repository to logs and other configurations at site identifies which records attackers modified and can suggest which kinds of information the attackers were most interested in hiding.
Known-good backups
PLC and other automation system configuration files and other important records can easily be dragged and dropped into the BlackBox repository. Remote control attacks cannot tamper with these backups. The BlackBox provides incident respons teams with knows-good backups to work from when restoring industrial systems.
How it works
Gather
Forensic data –
from industrial sources
Send
Safely – through Unidirectional Gateway hardware
Store
Reliably – in the unidirectionally-protected repository
Waterfall’s Industry-Specific Solutions
Cybersecurity for power plants
Power utilities rest easy knowing that remote cyber attacks cannot reach through their Unidirectional Gateways to mis-operate control systems responsible for worker and public safety, for preventing damage to long-lead time turbines and other equipment, or for assuring continuous and efficient production of electric power.
Cybersecurity for oil & gas
Owners and operators of offshore platforms, pipelines and refineries rest easy knowing that no cyber-sabotage attack is able to penetrate Unidirectional Gateway hardware to put at risk worker or public safety, the environment, long-lead-time equipment and reliable production and operation, without unplanned shutdowns.
Cybersecurity for rails
Rail and metro system operators rest assured when Unidirectional Gateways are deployed to protect vital networks including switching systems, electric power systems and operations control centers from cyber attacks originating on IT or Internet networks, no matter how sophisticated such attacks are now, or might become in the future.
Cybersecurity for facilities
Data centers, airports, government and military campuses and other very important facilities operators sleep well knowing that Unidirectional Gateways are unbreachable in the face of attacks traversing Internet-exposed IT networks to put public safety, important equipment and continuous & connect operations at risk
Cybersecurity for water Treatment
With Unidirectional Gateways deployed, municipal leaders can be confident of continuous and correct operation of their automation systems and water treatment infrastructure , even in the face of the most sophisticated of attacks coming across the Internet, both today and long into the future.
Cybersecurity for manufacturing
Nobody wants to be in next week's headlines explaining how another dozen plants were taken down by ransomware or other cyber attacks. Neither ransomware nor the most sophisticated of the Internet's attacks can breach Waterfall's Unidirectional Gateways to pose any threat to product quality or to continuous, and correct manufacturing operations,