|By PR Newswire||
|April 11, 2014 11:15 AM EDT||
RIDGEFIELD, Conn., April 11, 2014 /PRNewswire/ -- Owl Computing Technologies, Inc., a network security solutions provider, proudly announces the first implementation of the Owl Perimeter Defense Solution and its OPC Foundation Certified OPC Server Transfer Service application software in Saudi Arabia. This important installation successfully secures industrial control information previously at risk to cyber attacks.
In August 2012, heavy industry locations in the Middle East suffered a serious cyber-attack that caused plants in the region to disconnect corporate and process control networks from their business networks for reduced security vulnerability. Saudi Arabia Fertilizer Company (SAFCO), an affiliate to Saudi Basic Industries Corporation (SABIC), was no exception, and proceeded to isolate their plant network to minimize their risk exposure.
The isolation made it more difficult for SAFCO to safely and efficiently move process data from applications on the plant network to the business network. In response, Owl successfully installed a Perimeter Defense Solution (OPDS™) – a one-way data diode transfer solution – in December 2013 to support the secure transfer of industrial control information.
To handle industrial control protocols, the Owl OPC Server Transfer Service (OSTS™) application software was implemented. OSTS is OPC Foundation Certified to be compliant with OPC-DA and OPC-A&E. OSTS extracts data from selected OPC servers on the process control network transfers the data across the network boundary using DualDiode Technology® embedded in the OPDS. To complete the data transfer, OSTS interoperates efficiently with PI Historian, OSI OPC Connector, and ProcessBook software.
As a result of this implementation, the flow of data has been securely restored from the SAFCO plant network applications to the business network. Engineers and business management now have immediate access to both real-time and historical data that had been previously limited to physical access from within the plant perimeter, which had created operational inefficiencies.
This milestone installation enhances the cybersecurity best practices of SABIC and its affiliates, eliminating threats to network infrastructure and data.
For further information about cutting-edge Owl products please visit www.owlcti.com.
About Owl Computing Technologies, Inc.
Owl Computing Technologies is the leading source for next generation network security. Owl's DualDiode Technology®, a proprietary data diode, has been successfully deployed in over 1500 solutions across government, military and critical infrastructure networks. Owl's hardware-enforced technology enables secure, reliable and robust information sharing for all files sizes and data types.
CONTACT: Erica Taguiam, 646-564-3880, [email protected]
SOURCE Owl Computing Technologies, Inc.
Sep. 27, 2016 06:15 PM EDT Reads: 328
Sep. 27, 2016 06:00 PM EDT Reads: 1,682
Sep. 27, 2016 05:45 PM EDT Reads: 1,652
Sep. 27, 2016 05:30 PM EDT Reads: 1,985
Sep. 27, 2016 05:15 PM EDT Reads: 2,753
Sep. 27, 2016 05:15 PM EDT Reads: 280
Sep. 27, 2016 05:00 PM EDT Reads: 1,593
Sep. 27, 2016 04:45 PM EDT Reads: 383
Sep. 27, 2016 04:00 PM EDT Reads: 2,646
Sep. 27, 2016 03:15 PM EDT Reads: 2,861
Sep. 27, 2016 03:15 PM EDT Reads: 2,759
Sep. 27, 2016 03:15 PM EDT Reads: 1,388
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Sep. 27, 2016 03:00 PM EDT Reads: 1,692
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
Sep. 27, 2016 02:45 PM EDT Reads: 4,657
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 27, 2016 02:45 PM EDT Reads: 1,269