Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Waterfall One-Way

Waterfall’s™ Unidirectional Security Gateways and data diodes core is shared by all of its products and solutions. The Waterfall core, a unique non routable system, is coupled with software agents that mediate its integration into the surrounding environments, while providing added functionalities and flexibility.

The Waterfall product consists of a multiple layered architecture, providing high-speed, real-time and reliable data transfer using a proprietary unidirectional protocol, content filtering, data assurance mechanisms and application layer connectors for third party applications and standard protocols integration

Waterfall One-Way Customer Benefits

The unique Waterfall architecture and its attributes provide two basic benefits for all Waterfall One-Way installations and deployments:

  • Complete protection against external cyber attacks – hacking sessions are an interactive process in which a hacker initiates a working session with his target node, elicits a response, and accordingly makes his next move. When trying to hack across a Waterfall One-Way, the hacker will be unable to initiate a successful session.
  • No data backflow – The hardware based appliance core of the Waterfall One-Way enforces unidirectional data flow at the physical layer (Layer 1 of the OSI model), which in turn ensures unidirectional communication will be totally preserved at all higher layers of the protocol stack, regardless of the communication protocol chosen and the applications being used. Thus, regardless of networks and applications used, there will be no data backflow across a Waterfall One-Way.
  • Non Routable Protocols – Waterfall One-Way is a Non-routable communication system, as referred to in the relevant NERC-CIP definitions. This means that the communication path cannot be exploited to route messages or information to undesired or unplanned destinations.
  • Integral Application White listing – Waterfall One-Way, using the unique “Waterfall connectors framework”, enables only allowed application’s data and protocols to pass via the unidirectional gateway. Any other protocol, not set up at the gateway, is not supported and shall not pass

Waterfall One-Way provides customers with the most powerful electronic security perimeter available, enforced by hardware, software and the very basic laws of physics. This unique technology and  architecture helps ensure that compliance with NERC-CIP-005 requirements is  fully reached, while providing true cyber-security to all critical assets and cyber assets residing within the Waterfall defined electronic security perimeter.

Waterfall installations provide a hassle-free and zero-maintenance implementation of an electronic security perimeter, requiring a one-time configuration with no need for follow-up configurations, patches o

Rating
0 vote
Favoured:
0

Listing Details

Vendor
Waterfall Security Solutions Ltd.
Website
Visit the Product Site
Pricing Model
Commercial
Modified
Never
Owner
michelemjordan
Created
2010-12-14
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
    • - DLP Network
    • - Anti Spam Gateways
    • - Data Diodes
    • - Enterprise Appliance FW
    • - Enterprise Software FW
    • - SOHO Appliance FW
    • - Guards Mail
    • - Guards XML
    • - Guards Web
    • - Guards Net Mgmt
    • - Guards File Transfer
    • - Guards Authentication
    • - DDoS Mitigation
    • - IPS Evasion
    • - IPS Network
    • - Network Taps
    • - Load Balancers
    • - FW Mgmt and Test
    • - Firewall Next Generation
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message