Thursday 5 September 2024

Hardware-enforced remote access.

A game changer for secure remote access for CNI.

Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that are exploited routinely by sophisticated threat actors. In a recent webinar, Waterfall Security looked at problems with and attacks that breach conventional “secure” remote access, and they introduce Waterfall’s HERA — Hardware-Enforced Remote Access. With a layer of hardware-enforced protection, in addition to layers of software protection, this represents a material improvement in the security of remote access systems for OT networks, even at unattended sites. With strong client protections, TPM support, session recording, moderated access, moderated sessions, zero trust controls, and many other powerful features, HERA opens up a new era for protected remote access to critical networks.

This webinar looks at solutions that are enforced by dedicated hardware, and what benefits such solutions offer over comparable software-only solutions. Viewers can learn about problems with “secure” remote access and a new, powerful capability for safer remote access to OT systems. 

In this webinar, Andrew Ginter and guest speakers Greg Hale, Founder of ISSSource and esteemed former Editor of ISA's InTech, and Jim McGlone, CTO at Automation, Strategy & Performance and co-author of the highly-regarded Security PHA Review, take us through:

  • What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions? What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions? What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions?
  • How are these attacks and risks neutralized by hardware enforcement?
  • How can HERA contribute to strong OT network segmentation and physical segmentation requirements?
  • And examples of how Hardware Enforced Remote Access would be used day-to-day in an industrial setting.

@WaterfallSecure @isssource @ISA_Automation #PAuto #Cybersecurity

No comments:

Post a Comment