Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securely Replicate PI System Data Across Segmented Networks Dennis Lanahan, Vice President for Commercial Markets, Owl Cyber Defense Many critical infrastructure organizations have a PI system within their OT network to monitor real time asset values and archived/historical data. Th... 2 months ago | 46 mins A Data Storage Diode for Classified Sites - Storage Developer Conference Jean-Baptiste Riaux, Senior Data Center Field Application Engineer Learn more about developing a “Storage Diode” by combining specific pieces of storage technologies such as HDF5, multipathing, ACL, user authenticatio... 2 years ago | 31 mins Data Diodes: Air Gap Security for the Price of a Firewall Phil Won, Product Manager - CORE Platforms; Scott Coleman, VP Marketing Critical infrastructure requires a higher level of security than firewalls can deliver. Data diodes provide security based on hardware not software, c... 2 years ago | 52 mins Is It Time to Upgrade Your Data Diodes? Scott Coleman, VP Marketing; Dennis Lanahan, VP Sales-Critical Infrastructure Markets Are your systems near or at the end of their lifecycle? Are you operating on a platform that is no longer supported? As organizations review their c... 2 years ago | 39 mins What is a Data Diode Scott Coleman, VP Marketing; Dennis Lanahan, VP Sales – Critical Infrastructure Markets What is a data diode? As explained by Owl Cyber Defense employees. 2 years ago | 3 mins Enabling a secure connected infrastructure - CDS Lessons Learned Lisa Hawes, Sr. Product Manager & Autumn-Dawn Blanchette, Systems Engineering Manager, Forcepoint G2CI Find out DOD lessons learned from deploying CDS at scale. 2 years ago | 17 mins Defending Networks Against Hidden Threats in Files Henry Frith – VP of Customer Success & Sales Engineering, Votiro, Scott Coleman – VP of Product Management, Owl Cyber Defense In order to perform their duties in serving the public, government ministries receive large numbers of files, applications, permits and other document... 6 months ago | 61 mins Enabling Real-time Data Exchange in the Coalition Battlespace Michael Hampson, 3dot; Graham Booth, 2iC; Ken Walker, Owl Cyber Defense; Tom Goodman, Owl Cyber Defense; From the top down, from logistics and C4/I communications to identification friend or foe (IFF) positions and sensor data, the more complete the commo... 2 years ago | 54 mins Enabling a secure connected infrastructure - Where to Diode, Where to Guard Steven Tessler, Sr. Solutions Architect & Praphul Kumar, Product Manager, Forcepoint G2CI Technical & engineering experts methodically bursts urban legends around Diodes, revealing when you need them and when you don’t. 2 years ago | 26 mins Architecting OT Security for critical infrastructures in Singapore Richard Bussiere, Head of Operational Technology at Tenable and NG Koon Yeow, AVP, Cybersecurity Products, ST Engineering Join Tenable and ST Engineering as we share the benefits of a reference architecture that facilitates the comprehensive and safe monitoring and segreg... 2 years ago | 39 mins