{"id":639,"date":"2017-08-15T08:37:44","date_gmt":"2017-08-15T01:37:44","guid":{"rendered":"https:\/\/simenteknindo.com\/news\/?p=639"},"modified":"2017-08-15T08:37:44","modified_gmt":"2017-08-15T01:37:44","slug":"combining-technology-to-combat-cyber-threats","status":"publish","type":"post","link":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/","title":{"rendered":"Combining Technology to Combat Cyber Threats"},"content":{"rendered":"<p>As cyber threats become more complex, industrial control systems (ICS) are even more vulnerable to attack. To that end, plant floor security can\u2019t be handled the same way as it is in the enterprise where all the IT department may need is a firewall, virus detection software and network monitoring applications. The systems on the manufacturing floor need all of that\u2014and more\u2014because protecting ICSs requires multiple layers of security to keep the environment in a safe state.<\/p>\n<p>With that in mind, two cybersecurity technology vendors are teaming up to provide industrial businesses with a joint offering that unites threat detection software with hardware-enforced network protection.<\/p>\n<p>This week, Waterfall Security Solutions, a maker of a unidirectional security gateway, and FireEye, a provider of the Threat Analytics Platform (TAP), entered into a global partnership to deliver a multipronged approach to secure industrial networks.<\/p>\n<p>This joint offering enables customers to monitor their ICS networks using FireEye\u2019s cloud-based Helix service, a detection and response platform that simplifies, integrates and automates security operations. They can then safeguard the network using Waterfall\u2019s Unidirectional CloudConnect for reliable and secure IT\/OT integration.<\/p>\n<p>Here\u2019s how it works:<\/p>\n<p>FireEye\u2019s TAP aggregates log and event data from multiple sources and applies intelligence against that data to drive actionable alerts. Event data is compressed, encrypted and sent to the cloud for centralized log retention, real-time threat analysis and incident investigation. TAP can prioritize actions based on risk and can identify the highest priority focus areas for an incident responder to help organizations accelerate their detection and response cycles.<\/p>\n<p>CloudConnect also gathers data, specifically from industrial sources such as historians, OPC servers, devices and the ICS. It then converts that data into a unified cloud-friendly format, such as XML files, relational databases, publish\/subscribe protocols or SOAP web services. CloudConnect is based on Waterfall\u2019s Unidirectional Gateway technology that allows information to be sent out of the ICS network for data sharing with the enterprise, but it is physically incapable of receiving data back into the ICS network.<\/p>\n<p>Working together, TAP and CloudConnect integrate industrial networks with threat detection applications without the risk of allowing bad actors into the environment.<\/p>\n<p>Ironically, there is a cloud-based aspect to the cybersecurity offering. Industrial businesses that previously refrained from using any cloud or Industrial Internet of Things (IIoT) services due to security concerns, can be confident that their ICS networks are safe from external cyber risks.<\/p>\n<p>\u201cThis new partnership is an important step towards improved security for industrial sites,\u201d said Lior Frenkel, CEO and co-founder of Waterfall Security Solutions. \u201cAn increasingly complex industrial threat landscape demands increasingly sophisticated security solutions.\u201d<\/p>\n<blockquote class=\"td_quote_box td_box_center\">\n<p style=\"text-align: left;\">Source : https:\/\/www.automationworld.com\/article\/industry-type\/all\/combining-technology-combat-cyber-threats<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>As cyber threats become more complex, industrial control systems (ICS) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":640,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Combining Technology to Combat Cyber Threats - SIMENTEK News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Combining Technology to Combat Cyber Threats - SIMENTEK News\" \/>\n<meta property=\"og:description\" content=\"As cyber threats become more complex, industrial control systems (ICS) [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"SIMENTEK News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PtSimenteknindo\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-15T01:37:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4470\" \/>\n\t<meta property=\"og:image:height\" content=\"4063\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wimpy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@simenteknindo\" \/>\n<meta name=\"twitter:site\" content=\"@simenteknindo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wimpy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/\"},\"author\":{\"name\":\"Wimpy\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e\"},\"headline\":\"Combining Technology to Combat Cyber Threats\",\"datePublished\":\"2017-08-15T01:37:44+00:00\",\"dateModified\":\"2017-08-15T01:37:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/\"},\"wordCount\":457,\"publisher\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg\",\"articleSection\":[\"Industry News\",\"Tech News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/\",\"name\":\"Combining Technology to Combat Cyber Threats - SIMENTEK News\",\"isPartOf\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg\",\"datePublished\":\"2017-08-15T01:37:44+00:00\",\"dateModified\":\"2017-08-15T01:37:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg\",\"width\":4470,\"height\":4063},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/simenteknindo.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Combining Technology to Combat Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#website\",\"url\":\"https:\/\/simenteknindo.com\/news\/\",\"name\":\"SIMENTEK News\",\"description\":\"Distributor SIEMENS Indonesia\",\"publisher\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/simenteknindo.com\/news\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\",\"name\":\"PT. SIMENTEKNINDO\",\"url\":\"https:\/\/simenteknindo.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png\",\"width\":400,\"height\":400,\"caption\":\"PT. SIMENTEKNINDO\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PtSimenteknindo\/\",\"https:\/\/x.com\/simenteknindo\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e\",\"name\":\"Wimpy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg\",\"caption\":\"Wimpy\"},\"description\":\"www.linkedin.com\/in\/wimpynf\",\"sameAs\":[\"www.linkedin.com\/in\/wimpynf\"],\"url\":\"https:\/\/simenteknindo.com\/news\/author\/wnf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Combining Technology to Combat Cyber Threats - SIMENTEK News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"Combining Technology to Combat Cyber Threats - SIMENTEK News","og_description":"As cyber threats become more complex, industrial control systems (ICS) [&hellip;]","og_url":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/","og_site_name":"SIMENTEK News","article_publisher":"https:\/\/www.facebook.com\/PtSimenteknindo\/","article_published_time":"2017-08-15T01:37:44+00:00","og_image":[{"width":4470,"height":4063,"url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg","type":"image\/jpeg"}],"author":"Wimpy","twitter_card":"summary_large_image","twitter_creator":"@simenteknindo","twitter_site":"@simenteknindo","twitter_misc":{"Written by":"Wimpy","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/"},"author":{"name":"Wimpy","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e"},"headline":"Combining Technology to Combat Cyber Threats","datePublished":"2017-08-15T01:37:44+00:00","dateModified":"2017-08-15T01:37:44+00:00","mainEntityOfPage":{"@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/"},"wordCount":457,"publisher":{"@id":"https:\/\/simenteknindo.com\/news\/#organization"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg","articleSection":["Industry News","Tech News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/","url":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/","name":"Combining Technology to Combat Cyber Threats - SIMENTEK News","isPartOf":{"@id":"https:\/\/simenteknindo.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg","datePublished":"2017-08-15T01:37:44+00:00","dateModified":"2017-08-15T01:37:44+00:00","breadcrumb":{"@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#primaryimage","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/08\/gettyimages-cyberlock.jpg","width":4470,"height":4063},{"@type":"BreadcrumbList","@id":"https:\/\/simenteknindo.com\/news\/combining-technology-to-combat-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/simenteknindo.com\/news\/"},{"@type":"ListItem","position":2,"name":"Combining Technology to Combat Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/simenteknindo.com\/news\/#website","url":"https:\/\/simenteknindo.com\/news\/","name":"SIMENTEK News","description":"Distributor SIEMENS Indonesia","publisher":{"@id":"https:\/\/simenteknindo.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/simenteknindo.com\/news\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/simenteknindo.com\/news\/#organization","name":"PT. SIMENTEKNINDO","url":"https:\/\/simenteknindo.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png","width":400,"height":400,"caption":"PT. SIMENTEKNINDO"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PtSimenteknindo\/","https:\/\/x.com\/simenteknindo"]},{"@type":"Person","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e","name":"Wimpy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/image\/","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg","caption":"Wimpy"},"description":"www.linkedin.com\/in\/wimpynf","sameAs":["www.linkedin.com\/in\/wimpynf"],"url":"https:\/\/simenteknindo.com\/news\/author\/wnf\/"}]}},"_links":{"self":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/639"}],"collection":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/comments?post=639"}],"version-history":[{"count":1,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/639\/revisions"}],"predecessor-version":[{"id":641,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/639\/revisions\/641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/media\/640"}],"wp:attachment":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/media?parent=639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/categories?post=639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/tags?post=639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}