Waterfall Security Solutions Resources

Back to Top

Featured

Cyber-Informed Engineering for OT Security and AVEVA PI Users Webinar Digest
INFOGRAPHIC
Discover how Cyber-Informed Engineering's methodology offers an encompassing approach to OT security. Andrew Ginter spoke on our webinar about the proactive approach of Cyber-Informed Engineering and how it enhances the benefits of AVEVA PI.

READ MORE
About Waterfall: Unbreachable Security & Unlimited Connectivity
RESOURCES
About Waterfall Security Solutions and how they deliver complete cybersecurity and operational efficiency.

READ MORE
2023 Threat Report
RESOURCES
Analysis, takeaways and predictions of public reports of deliberate cyber attacks.

READ MORE

Unidirectional Security Gateways
EBOOK
Discover how Waterfall Security Solutions robust Unidirectional Security Gateways ensure physical protection against information theft and critical network sabotage. Click here to access this e-book.

LEARN MORE
Securing Operational Technology with Cyber-Informed Engineering
BLOG
Waterfall Security Solutions own, Andrew Ginter, discusses Unidirectional Security Gateways and how Waterfall set the standard for secure IT/OT and OT/cloud integration in this blog. Discover how these solutions facilitate secure IT/OT integration and safeguard physical, operatio...

READ MORE
Cybersecurity for AVEVA PI Servers
RESOURCES
Discover the cyber risks facing AVEVA PI servers with increased connectivity and suggests using Waterfall’s Unidirectional Security Gateways for strong protection against online threats.

READ MORE
Securing Power Generation At New Brunswick Power
CASE STUDY
Waterfall Security Solutions partners with Énergie NB Power to prevent cyberattacks by providing security, visibility, compliance and reduced operational costs.

READ MORE
Rail Operations Center
CASE STUDY
Waterfall Security Solutions’ Unidirectional Security Gateways protect the OCC network perimeters to maintain the highest level of safety and security from cyber attacks impacted by rail systems.

READ MORE
Cybersecurity for Detroit Water
CASE STUDY
Detroit’s IT/OT firewall was replaced with Waterfall Security Solutions Unidirectional Security Gateway to eliminate all possible threats penetrating operations from external networks, as well as lowering costs at an estimated $7 Million per year.

READ MORE
Enabling The Digital Refinery
CASE STUDY
Discover how the installation of Waterfall Security Solutions Unidirectional Gateway between the Process Control Network (PCN) and the Enterprise Network provides 100% security, visibility and compliance.

READ MORE
Good News and Bad News: The New TSA Pipeline Directive
CASE STUDY
The third iteration of the US TSA Security Directive Pipeline 2021-02C (SDP-2021-02C) takes a more generalized approach compared to the initial two versions, and this has both positive and negative implications. On the positive side, the broader phrasing of requirements allows o...

READ MORE
Simplifying Network Segmentation for the TSA Pipeline Security Directive
CASE STUDY
The abrupt shutdown of the Colonial Pipeline took senior decision-makers by surprise. The pipeline was halted as a precautionary measure due to a compromised IT network, despite no evidence of the ransomware affecting the OT network. Prior to this incident, senior decision-makers...

READ MORE
Engineering-Grade security in the US DOE Cyber Informed Engineering Strategy | Episode #100
PODCAST
We discuss a fresh approach outlined by the US Department of Energy, known as Cyber Informed Engineering (CIE). It’s an approach that focuses on impenetrable safety measures, manual controls, and robust engineering safeguards that are added to the existing and conventional cybers...

LEARN MORE
The New Era Of Cyber Insurance
EBOOK
Cyberattacks are no longer a threat, but a painful and costly reality. Simultaneous “cybercatastrophic” attacks against multiple targets with widespread consequences have been estimated to incur between $243B and $1T USD per attack. Many insurance providers respond to such potent...

LEARN MORE
BSEE Well Control Rule: Real Time Monitoring and Waterfall Unidirectional Gateways
EBOOK
BSEE has issued the Well Control Final Rule to consolidate existing well control rules into a revised regulation that addresses Blow Out Preventer (BOP) system design, performance and reliability. Operators will be required to gather, monitor and transmit to a monitoring onshore ...

LEARN MORE
The Curious Case of Dual Event Logs - Unmasking Cyber Attackers Through Comparison
BLOG
In the ever-evolving landscape of cybersecurity, organizations face an unrelenting barrage of sophisticated cyber threats. As the techniques employed by malicious actors become increasingly sophisticated, the need for robust defense mechanisms and thorough investigation method...

READ MORE
Engineering Grade Protection for Data Center OT System - Protecting Data Centers From Industrial OT Threats
BLOG
Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data centers are essential to uptime – electric power systems, backup power, fire suppression, physical access control, cooling and more. Managing cybersecurity for th...

READ MORE
How cyber attacks impact industrial operations?
INFOGRAPHIC
Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years. How can you stay ahead of the threat environment and ensure all systems are a go, even if your IT networks are infected? What cou...

READ MORE
Oil and Gas Cyber Attacks
INFOGRAPHIC
What cyber crime threats to oil & gas infrastructures are top of mind for government and business leaders? Our exclusive infographic explores the top 6 cyber attacks on oil & gas industries in the last decade. From the Shamoon incident that erased 30,000 computers to last year’s...

READ MORE
Ransomware Attack on Data Center Infrastructure
INFOGRAPHIC
As data centers grow in importance, scale, and complexity, so do the security challenges they face. Among the various security challenges data centers regularly address, the threats to Operational Technology (OT) and Industrial Control Systems (ICS) – otherwise known as the Data ...

READ MORE
NIS2 Compliance Guide for OT systems
EBOOK
The NIS2 Directive is an updated EU cybersecurity law that builds on the original NIS Directive (NISD). The goals of NIS2 are to boost cybersecurity, simplify reporting, and create consistent rules and penalties across the EU. By expanding its scope, NIS2 requires more businesses...

LEARN MORE
Waterfall Use Cases Catalogue
CASE STUDY
Waterfall COTS solutions fit into any network architecture. The Unidirectional Security Gateway provides protection from remote cyber threats. To learn how Waterfall’s Unidirectional gateway technology deploys at customer sites, download this resource.

READ MORE
OT Security Incidents
EBOOK
This eBook from Andrew Ginter of Waterfall Security Solutions and Gregg Hale of ICSSTRIVE, covers cyber attacks with physical consequences in process and discrete manufacturing industries more than doubled from the year 2020 to 2021. Almost all reported incidents were the result ...

LEARN MORE
Firewalls vs Unidirectional Gateways
EBOOK
Firewalls are used in industrial networks and throughout enterprise networks, but usually require at least one layer of unidirectional gateway technology. Many security practitioners assume that a unidirectional gateway is some sort of “unidirectional firewall”. To compare the ef...

LEARN MORE