Waterfall BlackBox
0.00

Categories

Problems that solves

Risk or Leaks of confidential information

Low bandwidth data channels

Risk of data loss or damage

Risk of lost access to data and IT systems

Values

Ensure Security and Business Continuity

Manage Risks

Waterfall BlackBox

As an airplane black-box survives a crash, the Waterfall BlackBox survives a cyberattack, keeping your logs untampered and secure.

Description

Waterfall Security’s patented BlackBox leverages Waterfall’s-market-leading, hardware-enforced unidirectional technology to securely gather, store, and transmit transaction, logs and other data into a storage repository located securely “behind” a Unidirectional Gateway. All data sent to the storage repository is stored physically outside the monitored network, inaccessible and untouchable.    Inside Waterfall’s BlackBox cyber security incident response solution there is a high-speed, high-capacity logging and analysis system, which can be used to detect attackers’ tracks, attempted changes, manipulation of records and abnormal logging and recording conditions. In time of need, data can be retrieved and inspected securely by physically accessing the BlackBox appliance via the Secure Data Access port. The Waterfall BlackBox faceplate hardware physically blocks the Secure Data Access port when the port is not in use.

Features & Benefits: SECURE STORAGE
  • Hardware-enforced unidirectional protection of logged data
  • Tamper-proof storage for logs, transactions & configuration files
  • Reliable forensics, incident response & recovery, and audits
  • Encryption and authentication of logged information
  • No possibility of leaking information between sites
SECURE LOG DATA RETRIEVAL
  • Logs accessed via dedicated out-of-band port
  • Powerful graphical data management and retrieval applications
  • Full or partial retrieval with search and filter capabilities
DATA MANAGEMENT
  • All logs unified and stored in internal relational database
  • All recorded data time-stamped and encrypted
  • Cyclic & never-overwrite data management options
  • Version management for configuration and other files
  • Real-time statistics display
  • Optional compression
WIDE VARIETY OF DATA SOURCES
  • Syslog, SNMP traps, Windows logs
  • FTP, SFTP, CIFS/SMB, drag & drop and many other file sources
  • System Backups
  • SQL Server, Oracle and other relational databases
  • Network traffic and NetFlow statistics

Scheme of work

 Scheme of work

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief Technical Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

Сonfidential data

Internet access is available for employees

IT Security Department in company

GDPR Compliance

Data Warehouse