Hi [[ session.user.profile.firstName ]]

Data Diodes: Air Gap Security for the Price of a Firewall

Critical infrastructure requires a higher level of security than firewalls can deliver. Data diodes provide security based on hardware not software, creating an impenetrable defensive barrier from outside attacks. Proven over the last two decades in critical infrastructure deployments, data diodes are now available at a price equivalent to firewalls. Data diodes enable air gapped facilities to communicate externally without creating any threats to the facility.

Join Owl’s Phil Won, Product Manager – CORE Platforms, and Scott Coleman, VP of Marketing, as they discuss how Owl data diodes preserve the security of an air gap while allowing business continuity, for the price of a firewall.

Key takeaways:

* Recognizing the inherent vulnerabilities in software-based, industrial firewalls
* Understanding the benefits of hardware-enforced cybersecurity in critical infrastructure
* Answers to common misconceptions about data diodes
* Data diode pricing compared to industrial firewalls
* Best practices for securing OT connections
Recorded Jun 30 2021 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Phil Won, Product Manager - CORE Platforms; Scott Coleman, VP Marketing
Presentation preview: Data Diodes: Air Gap Security for the Price of a Firewall

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Meet NCDSMO Requirements for Zero-Trust Hardware-enforced Security Oct 14 2021 3:30 pm UTC 60 mins
    Scott Coleman; Ken Walker; Tom Goodman; Shawn Campbell
    Without regularly collecting and sharing information between networks, military and intelligence operations come to a halt. But identifying and vetting every connection maintained on a coalition partner network is impossible. Taking a zero-trust approach to connecting to these networks only makes sense.

    As the risks have increased, the NSA’s National Cross Domain Strategy and Management Office (NCDSMO) has implemented new requirements for Cross Domain Solutions (CDSs) to keep pace. Specifically, under the latest Raise the Bar (RTB) guidance, CDSs are now required to utilize hardware to properly segment networks and form a zero-trust barrier.

    Join our panel of cybersecurity experts as they review the scope and complexity of the NCDSMO compliance requirements, using hardware for zero-trust and segmentation, and the associated timeline to achieve those requirements.

    Key takeaways:
    * Understanding high threat networks
    * The role of hardware in zero-trust environments
    * How to simplify meeting NCDSMO requirements with hardware-enforced security
    * RTB requirements for connecting cross domain solutions
  • Partner Program: The Path to Success - Competitive Advantages Oct 6 2021 12:00 pm UTC 60 mins
    Dennis Lanahan, VP, Critical Infrastructure Markets
    The next webinar in our Partner Program series will focus on competitive advantages. You'll learn about how Owl Cyber Defense is better than the competition, reliability, ROI, Software and Feature/Functionality.
  • OWT: The Perfect Solution for Meeting RTB Operational and Audit Requirements Oct 5 2021 5:30 pm UTC 60 mins
    Scott Coleman, Shawn Campbell, Mike Parry, Brian Romansky
    According to the latest Raise-the-Bar requirements from the NCDSMO for the U.S. Department of Defense (DoD) and Intelligence Community (IC), any active cross domain solution (CDS) will be required to transmit audit logs to a Defensive Cyber Operations (DCO) center where monitoring and forensics can be performed. There is a similar requirement in effect for the NSA Commercial Solutions for Classified (CSfC) Continuous Monitoring (CM) of network segments and other high-security architectures. Hardware-enforced one-way transfer (OWT) devices, such as a data diode, are required security mechanisms for this purpose.

    Deployments of ten or dozens of cross domain solutions can result in a massive concentration of OWT devices, placing unsustainable size, weight, power, and cost burdens on even the most well-funded programs. Large numbers of standalone OWT devices also create an administrative nightmare for network operators who need to configure and manage an individual appliance for every connection.

    Join our panel of cybersecurity experts as they discuss the latest Raise the Bar requirements for DCO audit & logging, the issues facing operators, and how new technologies can help consolidate connections, reducing operational and capital expenses, while meeting RTB requirements.

    What you’ll learn:
    * Key elements of the latest RTB requirements for DCO and CSfC
    * Architectures to meet the RTB requirements using CDSs and OWT solutions
    * Solutions to reduce operational and capital expenses while meeting RTB requirements
  • Partner Program: The Path to Success - Partner Enablement & Curriculum Overview Recorded: Jul 27 2021 41 mins
    Charlie Schick, Client Engagement Manager; Geetha Yechana, Global Partner Manager
    The Owl Cyber Defense Partner Program was established to bring together leading organizations from around the globe to share our devotion to solving real cybersecurity challenges with the best people and technology in the industry.

    Our goal is to partner with organizations that align with our business objectives, mission, and quality standards so, together, we form a long-lasting relationship that produces value and success for our customers.

    Join us in this next installment of Partner Program webinars as we share with you what tools and curriculum we are producing to help you sell. Also, we'll walk you through a standard customer presentation, highlighting key questions to ask customers during the sales process.

    In this webinar, you will learn about:
    * Partner enablement tools and curriculum
    * Introductory customer presentation
    * Key qualifying questions
  • Data Diodes: Air Gap Security for the Price of a Firewall Recorded: Jun 30 2021 52 mins
    Phil Won, Product Manager - CORE Platforms; Scott Coleman, VP Marketing
    Critical infrastructure requires a higher level of security than firewalls can deliver. Data diodes provide security based on hardware not software, creating an impenetrable defensive barrier from outside attacks. Proven over the last two decades in critical infrastructure deployments, data diodes are now available at a price equivalent to firewalls. Data diodes enable air gapped facilities to communicate externally without creating any threats to the facility.

    Join Owl’s Phil Won, Product Manager – CORE Platforms, and Scott Coleman, VP of Marketing, as they discuss how Owl data diodes preserve the security of an air gap while allowing business continuity, for the price of a firewall.

    Key takeaways:

    * Recognizing the inherent vulnerabilities in software-based, industrial firewalls
    * Understanding the benefits of hardware-enforced cybersecurity in critical infrastructure
    * Answers to common misconceptions about data diodes
    * Data diode pricing compared to industrial firewalls
    * Best practices for securing OT connections
  • Industrial Cross Domain Security: How U.S. Gov't Best Practices Translate to CI Recorded: Jun 22 2021 44 mins
    Mark Toussaint, Product Manager; Shawn Campbell, Principal Product Mgr., Gov't Solutions; Scott Coleman, VP Marketing
    Modern critical infrastructure is increasingly reliant on connected systems, data visibility, and remote access. Unfortunately, these connections create additional threat vectors, exposing the OT network to risk. Similar to that of the U.S. Government, critical infrastructure requirements are continuing to evolve and increase in complexity. Traditional methods, like firewalls, simply do not provide the protection required by critical infrastructure today. For decades, the U.S. Government has deployed cross domain solutions (CDS) to protect secure networks and now critical infrastructure can deploy cross domain solutions (traditionally only sold to defense and intelligence agencies) to meet complex, evolving use cases. As the pinnacle of boundary security devices, a cross domain solution (CDS) transcends the traditional OT security paradigm with content inspection beyond next-generation firewalls, the hardware-enforced segmentation of data diodes, and the advanced data filtering engine of a software guard - all in one powerful device.

    Join Owl Cyber Defense experts Mark Toussaint, Product Manager - Applications; Shawn Campbell, Principal Product Manager of Government Solutions; and Scott Coleman, VP of Marketing, as they discuss U.S. Government best practices for securing one-way and bidirectional data transfers and how cross domain security translates into critical infrastructure today.

    Key takeaways:

    * The current state of the critical infrastructure cybersecurity market
    * The benefits of Cross Domain Security in critical infrastructure
    * U.S. Government best practices and how they translate to critical infrastructure
    * Complex critical infrastructure use case examples
    * Best practices for securing one-way and bidirectional data transfers
  • High Threat Networks: How to Securely Share Mission Critical Information Recorded: Jun 3 2021 68 mins
    Ken Walker, Owl Cyber Defense; John Fleming, Owl Cyber Defense; Olav Kjono, MBO Partners; Jay Kowalczyk, Nimbus Virga, Inc.
    U.S. military and intelligence missions and organizations are increasingly collecting and sharing information over the internet and other networks with varying (or unknown) levels of security. This information sharing is often essential for achieving operational goals, especially in joint and coalition environments. However, sharing data over the internet and other “high threat networks” presents a significant cybersecurity challenge.

    A high threat network is a network in which a known or suspected threat actor is or could be operating. High threat networks may also be networks that lack sufficient cyber security measures, or where the network ownership and security posture is unknown. In its Raise the Bar guidance, the National Cross Domain Strategy and Management Office (NCDSMO) provides updated standards for protecting secure networks against the risks lurking within high threat networks.

    Join our panel of cybersecurity experts as they discuss the risks and threats of infiltration of potential attacks or exfiltration of unauthorized data associated with such connections. You’ll also hear about how mitigation processes and technologies are being used to mitigate such risks and threats and protect the need for mission critical information sharing.

    Key takeaways:
    • Understanding High Threat Networks
    • What is Raise the Bar (RTB) and how does it relate to High Threat Networks
    • High Threat Networks Use Cases
  • Owl Partner Program: The Path to Success Recorded: May 18 2021 68 mins
    Glenn Braverman, VP Int'l Sales.; Phil Won, Product Mgr., CORE Platform; Mark Toussaint, Product Mgr., Applications
    Owl Cyber Defense Partner Program was established to incorporate leading organizations from around the globe to share our devotion to solving real cybersecurity challenges with the best people and technology in the industry.

    Our goal is to partner with organizations that align with our business objectives, mission and quality standards so together, we form a long-lasting relationship that produces value and success for our customers.

    Join us as we review the notable accomplishments that have helped shape the future of our Partner Program and why there’s never been a better time to be a valued Owl Partner.

    In this webinar, you will learn about:
    * Overview of the Owl Partner Program
    * New products
    * Updates to existing products
    * Teaming Agreements
    * Platinum and Gold Partner Tiers
  • Is It Time to Upgrade Your Data Diodes? Recorded: Apr 15 2021 39 mins
    Scott Coleman, VP Marketing; Dennis Lanahan, VP Sales-Critical Infrastructure Markets
    Are your systems near or at the end of their lifecycle? Are you operating on a platform that is no longer supported?

    As organizations review their cybersecurity inventory, there comes a time when technology needs to be refreshed. Whether your data diode technology is at the end of its lifecycle or it is no longer supported, it must be replaced to provide up-to-date protection for secure critical infrastructure networks. As you begin planning to replace or upgrade your data diodes, you might be wondering what has changed in the 5, 10, or even 20 years since you purchased your original equipment.

    Join Owl Cyber Defense’s Scott Coleman, VP Marketing, and Dennis Lanahan, VP Sales, Critical Infrastructure Markets, as they discuss advances in data diode technology over the last few years, new available features and capabilities, and perhaps most importantly, how pricing has dropped significantly as the technology has matured. They’ll also break down Owl’s new Data Diode Upgrade Program, including low upgrade pricing on single-purpose and multi-purpose data diodes.

    During this webinar, you’ll learn about:
    * The newest developments in data diodes
    * The latest supported protocols and applications
    * New use cases for cloud, IIoT, and more
    * What’s included in the Data Diode Upgrade Program
    * Owl’s lowest data diode pricing ever
    * How to lock in upgrade pricing
  • Enabling Real-time Data Exchange in the Coalition Battlespace Recorded: Apr 8 2021 54 mins
    Michael Hampson, 3dot; Graham Booth, 2iC; Ken Walker, Owl Cyber Defense; Tom Goodman, Owl Cyber Defense;
    From the top down, from logistics and C4/I communications to identification friend or foe (IFF) positions and sensor data, the more complete the common operating picture provided by data from every available element within the coalition battlespace, the more effective and efficient coalition operations and command become. However, coalition partner nations have lagged the United States in technological advancement, leaving a gap in communications capabilities. Therefore, enabling real-time data exchange between all partners in the coalition battlespace is the paramount challenge to maintaining an asymmetric information advantage against near peer adversaries in the modern contested environment.

    Owl Cyber Defense, in partnership with 4Secure, invites you to join our panel of experts as they discuss the importance of timely, actionable data sharing in the coalition data environment and investigate the latest technologies to enable secure real-time information exchange between partner nations.

    During this webinar, you’ll learn:
    - Data requirements and sources within the modern contested environment
    - The importance of real-time data transfer in the coalition data architecture
    - Technologies to enable a complete common operating picture
  • The Critical Value of Hardware-Enforced Security Recorded: Mar 3 2021 45 mins
    Brian Romansky, Chief Innovation Officer; Mike Parry, Product Manager
    In critical infrastructure, there’s no room for inherently vulnerable cybersecurity solutions. The hacker community has spent decades developing ways to exploit commercial software ecosystems--the same software that’s used in industrial firewalls. Despite ongoing advances in software development, significant vulnerabilities continue to threaten critical infrastructure facilities and equipment. The need for hardware-enforced cybersecurity--designed for industrial systems, and impervious to common attack vectors--is greater than ever.  

    Join us as we discuss the critical value of hardware-enforced cybersecurity, as well as share insights about how the market is shifting to a new approach, protecting industrial equipment from the inside. 

    During this webinar, you'll learn about:

    Vulnerabilities of software-based solutions

    Application of hardware-enforced security in critical infrastructure  

    Field programmable gate array (FPGA) technology

    Ripple 20 and Amnesia:33 attacks   

    A new approach to protecting industrial equipment
  • Raising the Bar Recorded: Feb 12 2021 62 mins
    Shawn Campbell, Principal Product Manager for Government Solutions
    As cyber threats from criminal organizations and nation-states continue to rise, it’s critical that military and government organizations protect systems from these persistent threats. Cross Domain Solutions (CDS) have been protecting the sharing of sensitive information and are required for connecting networks of differing security levels. Specific technical requirements and certifications are established by the US National Security Agency (NSA) National Cross Domain Strategy and Management Office (NCDSMO).

    With the recent release of the Owl RTB-Ready Scowt tactical CDS platform, Owl is sharing how we are complying with NCDSMO “Raise the Bar” (RTB) for CDS standards, and new guidelines in order to better protect sensitive networks and data. Leveraging 20 years’ experience of working with NCDSMO, Owl will discuss RTB-compliant design patterns for recursive decomposition of complex file types; using a linear process for message based protocols; and integrating Data Format Description Language (DFDL) to extend supported data types without additional certification.
  • What is a Data Diode Recorded: Feb 12 2021 3 mins
    Scott Coleman, VP Marketing; Dennis Lanahan, VP Sales – Critical Infrastructure Markets
    What is a data diode? As explained by Owl Cyber Defense employees.
  • Owl XDE Embedded Cybersecurity Modules Recorded: Feb 2 2021 2 mins
    Animated Video
    Thinking about the next level of security for your PLCs? What if your PLCs were self-protected? Equipment manufacturers are moving towards self-protected security. From SCADA devices to PLCs, industrial devices are getting ready to protect themselves.
Monthly webcasts for military, gov't and CI communities
Owl Cyber Defense leads the world in data diode and cross domain network cybersecurity. With a constant focus on customers in the military, government, critical infrastructure, and commercial communities, Owl develops market-first, one-way data transfer products to meet a variety of operational needs, from entry level to enterprise. Owl cybersecurity specialists have helped hundreds of organizations around the world secure their networks with Owl’s patented hardware-enforced, unhackable data diode solutions.

focus on customers in the military, government, critical infrastructure, and commercial communities, Owl develops market-first, one-way data transfer products to meet a variety of operational needs, from entry level to enterprise. Owl cybersecurity specialists are intimately familiar with a wide variety of industry pain points, technologies, and best practices, and have helped hundreds of organizations around the world secure their networks with Owl’s patented hardware-enforced, unhackable data diode solutions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Diodes: Air Gap Security for the Price of a Firewall
  • Live at: Jun 30 2021 3:30 pm
  • Presented by: Phil Won, Product Manager - CORE Platforms; Scott Coleman, VP Marketing
  • From:
Your email has been sent.
or close