Hi [[ session.user.profile.firstName ]]

Defending the Castle – Back to the Future using Isolated Networks

In industries where extreme security is a requirement, like the nuclear, energy, manufacturing, financial, and defense industries, an air gapped network can be an extremely powerful defense. Air gapped networks are like dealing with the past and present at the same time: they harken back to a time before the Internet, but they are also even more useful now because of the Internet, which provides a path for both good and bad activity.

In this presentation, we’ll discuss the concept of the air gap, or isolated network, and explain what their weaknesses are and when they should or shouldn't be used. We’ll also discuss how, when used correctly, an air gapped network can be such a powerful defense.

Even though air gaps are extremely powerful defense mechanisms, every defense has its weakness. The key is to minimize these weaknesses by establishing a secure work flow that at the same time reduces the operational productivity concerns that surround air gapped networks. The latter portion of this presentation covers one of the most critical defense measures that is required in an air gap network, "the Kiosk", and best practices in employing "kiosks" as a critical part of an air gapped network defense strategy. We’ll also talk about data diodes, and how they can be employed to help reduce the operational cost of using an air gapped network.
Recorded Aug 16 2018 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Alexander, Director of Product Marketing, OPSWAT
Presentation preview: Defending the Castle – Back to the Future using Isolated Networks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • F5 & OPSWAT Webinar: Preventing Cyber Attacks on Web Applications Recorded: Aug 28 2018 61 mins
    Mark Campbell – Security Product Marketing, F5 Networks and George Prichici – Director of Product Management, OPSWAT
    In this webinar, security experts from F5 Networks and OPSWAT will share real-world examples on how cyber criminals can launch advanced attacks through web applications and how to stop them. The most critical web application security risks will be discussed, including file-borne threats on web applications and the joint F5 & OPSWAT solution that addresses these threats. The webinar will include a demo of a simulated web attack.

    After attending this webinar, you will be able to:

    - Identify the most critical web application security risks
    - Understand the best practices for web application security
    - Establish prevention for file-borne threats on web applications
  • Defending the Castle – Back to the Future using Isolated Networks Recorded: Aug 16 2018 58 mins
    John Alexander, Director of Product Marketing, OPSWAT
    In industries where extreme security is a requirement, like the nuclear, energy, manufacturing, financial, and defense industries, an air gapped network can be an extremely powerful defense. Air gapped networks are like dealing with the past and present at the same time: they harken back to a time before the Internet, but they are also even more useful now because of the Internet, which provides a path for both good and bad activity.

    In this presentation, we’ll discuss the concept of the air gap, or isolated network, and explain what their weaknesses are and when they should or shouldn't be used. We’ll also discuss how, when used correctly, an air gapped network can be such a powerful defense.

    Even though air gaps are extremely powerful defense mechanisms, every defense has its weakness. The key is to minimize these weaknesses by establishing a secure work flow that at the same time reduces the operational productivity concerns that surround air gapped networks. The latter portion of this presentation covers one of the most critical defense measures that is required in an air gap network, "the Kiosk", and best practices in employing "kiosks" as a critical part of an air gapped network defense strategy. We’ll also talk about data diodes, and how they can be employed to help reduce the operational cost of using an air gapped network.
  • Securing IoT: Trust No Thing Recorded: Jun 13 2018 44 mins
    Jianpeng Mo - VP of Engineering at OPSWAT & Deborah Galea – Security Evangelist at OPSWAT
    As IoT devices are increasing in popularity, so are IoT cyberattacks. In this Webinar we will describe the characteristics of IoT Advanced Persistent Threats (APTs), discuss the specific challenges of IoT cyberattacks, and provide recommended defense strategies for the IoT environment.

    The following topics will be covered:

    • Recent IoT Security Incidents
    • Reasons for IoT Attacks
    • IoT Security Challenges
    • The IoT Kill Chain
    • Addressing IoT Firmware Vulnerabilities
    • Preventing Threats in IoT Data and Files
    • Securing IoT with OPSWAT


    About the Speakers:

    Jianpeng Mo - VP of Engineering at OPSWAT
    Jianpeng leads OPSWAT development teams for device compliance management solutions. He has been granted 6 U.S. patents for device encryption, network access control, and vulnerability assessment technologies.

    Deborah Galea – Security Evangelist at OPSWAT
    Deborah is a seasoned enterprise cybersecurity expert with 20+ years of experience in the industry and is dedicated to identifying solutions that help companies of all sizes secure the data workflow in their organization. Prior to joining OPSWAT, Deborah co-founded Red Earth Software, a company that specialized in email security solutions for Microsoft Exchange Server.
  • How Upwork Eliminated Zero-Day File Attacks with MetaDefender Recorded: Sep 21 2017 27 mins
    Teza Mukkavilli, Head of Information Security at Upwork
    Join OPSWAT for an online fireside chat with Teza Mukkavilli, Head of Information Security at Upwork, a leading online freelancing site. Learn how Upwork addressed the threat of zero-day or unknown threats hidden in file uploads. Review how Upwork leverages MetaDefender data sanitization/Content Disarm and Reconstruction (CDR) and multi-scanning technology for advanced threat prevention.
Trusted by over 1,000 organizations worldwide.
Enterprises today are beset by cyber attacks. Threat actors send attacks through any channel they can, and meanwhile, the cost of compromise is only going up.

To solve the challenges faced by modern enterprises and to shut off major attack vectors, we offer two product platforms: MetaDefender for threat prevention and MetaAccess for cloud access control and endpoint compliance. Our guiding principles: Trust No File. Trust No Device.

Why MetaDefender?
Enterprises are investing more resources than ever in cyber security – and yet there are more and larger breaches every year. Thousands of threat prevention solutions are on the market, but most of them share one crucial flaw: they are based on detection, but detection is never 100% perfect.

That's why our advanced threat prevention platform, MetaDefender, is not only based on detection.

MetaDefender uses OPSWAT's unique data sanitization (Content Disarm and Reconstruction) to remove threats from files altogether by reconstructing the files and, in the process, stripping out potentially malicious active content and scripts. MetaDefender complements data sanitization with multi-scanning and vulnerability assessment.

Why MetaAccess?
The move by enterprises to cloud computing, SaaS applications, and bring your own device (BYOD) environments over the last decade has eliminated the traditional network perimeter, making most network access control (NAC) solutions obsolete.

To meet the challenges of modern cloud-based environments and provide administrators with an access control solution for the cloud, we built MetaAccess. MetaAccess keeps SaaS applications and cloud data safe and secure. It allows access based on device health and compliance to help administrators block risky devices from connecting to sensitive cloud data and SaaS applications.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defending the Castle – Back to the Future using Isolated Networks
  • Live at: Aug 16 2018 6:00 pm
  • Presented by: John Alexander, Director of Product Marketing, OPSWAT
  • From:
Your email has been sent.
or close