|By PR Newswire||
|April 11, 2014 11:15 AM EDT||
RIDGEFIELD, Conn., April 11, 2014 /PRNewswire/ -- Owl Computing Technologies, Inc., a network security solutions provider, proudly announces the first implementation of the Owl Perimeter Defense Solution and its OPC Foundation Certified OPC Server Transfer Service application software in Saudi Arabia. This important installation successfully secures industrial control information previously at risk to cyber attacks.
In August 2012, heavy industry locations in the Middle East suffered a serious cyber-attack that caused plants in the region to disconnect corporate and process control networks from their business networks for reduced security vulnerability. Saudi Arabia Fertilizer Company (SAFCO), an affiliate to Saudi Basic Industries Corporation (SABIC), was no exception, and proceeded to isolate their plant network to minimize their risk exposure.
The isolation made it more difficult for SAFCO to safely and efficiently move process data from applications on the plant network to the business network. In response, Owl successfully installed a Perimeter Defense Solution (OPDS™) – a one-way data diode transfer solution – in December 2013 to support the secure transfer of industrial control information.
To handle industrial control protocols, the Owl OPC Server Transfer Service (OSTS™) application software was implemented. OSTS is OPC Foundation Certified to be compliant with OPC-DA and OPC-A&E. OSTS extracts data from selected OPC servers on the process control network transfers the data across the network boundary using DualDiode Technology® embedded in the OPDS. To complete the data transfer, OSTS interoperates efficiently with PI Historian, OSI OPC Connector, and ProcessBook software.
As a result of this implementation, the flow of data has been securely restored from the SAFCO plant network applications to the business network. Engineers and business management now have immediate access to both real-time and historical data that had been previously limited to physical access from within the plant perimeter, which had created operational inefficiencies.
This milestone installation enhances the cybersecurity best practices of SABIC and its affiliates, eliminating threats to network infrastructure and data.
For further information about cutting-edge Owl products please visit www.owlcti.com.
About Owl Computing Technologies, Inc.
Owl Computing Technologies is the leading source for next generation network security. Owl's DualDiode Technology®, a proprietary data diode, has been successfully deployed in over 1500 solutions across government, military and critical infrastructure networks. Owl's hardware-enforced technology enables secure, reliable and robust information sharing for all files sizes and data types.
CONTACT: Erica Taguiam, 646-564-3880, [email protected]
SOURCE Owl Computing Technologies, Inc.
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
Oct. 20, 2016 08:45 PM EDT Reads: 867
Oct. 20, 2016 08:00 PM EDT Reads: 8,873
Oct. 20, 2016 07:15 PM EDT Reads: 1,562
Oct. 20, 2016 06:45 PM EDT Reads: 7,935
Oct. 20, 2016 06:30 PM EDT Reads: 1,808
Oct. 20, 2016 06:15 PM EDT Reads: 1,776
Oct. 20, 2016 06:00 PM EDT Reads: 825
Oct. 20, 2016 05:30 PM EDT Reads: 2,775
Oct. 20, 2016 05:30 PM EDT Reads: 838
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 20, 2016 05:15 PM EDT Reads: 11,014
Oct. 20, 2016 05:15 PM EDT Reads: 3,608
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Oct. 20, 2016 03:45 PM EDT Reads: 2,657
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
Oct. 20, 2016 03:45 PM EDT Reads: 883
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Oct. 20, 2016 03:00 PM EDT Reads: 3,768