Compact industrial firewall appliance
Icon Labs announces Floodgate Defender, a compact industrial firewall to provide cyber security protection for industrial, military, and critical infrastructure equipment.
Icon Labs, a provider of embedded networking and security technology, has announced availability of its Floodgate Defender firewall appliance. This new device provides a critical layer of security for devices on all sorts of industrial networks.
Alan Grau, president of Icon Labs, says that industrial networks have many devices with little or no internal protection since they were designed to be on closed networks. “Even though they perform critical functions managing our power grid, factories, communication networks and hospitals, they are easy targets for cyber-criminals and cyber-terrorism,” he said. “Floodgate Defender provides a simple and effective solution to stop these attacks.”
Floodgate Defender is placed between the Internet and the device. It can be configured with communication policies customized for the device it is protecting. Floodgate Defender enforces those policies, blocking attacks before a connection can be established with the target device. It uses stateful packet inspection (SPI) and rules-based filtering. A secure web interface is provided for configuring communication policies.
”Embedded devices have failed to maintain pace with the increasing number of attacks targeting them, making them easy targets for industrial espionage, hacktivists, or even terrorist groups. These devices need the same level of security used to protect enterprise networks,” said Jared Weiner - analyst, M2M embedded software & tools, VDC Research. “Floodgate Defender provides these devices with a critical, missing layer of security.”
Edited by Peter Welander, pwelander(at)cfemedia.com
|Search the online Automation Integrator Guide|
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.