Categories
Problems that solves
Risk or Leaks of confidential information
Low bandwidth data channels
Risk of data loss or damage
Risk of lost access to data and IT systems
Values
Ensure Security and Business Continuity
Manage Risks
Waterfall BlackBox
As an airplane black-box survives a crash, the Waterfall BlackBox survives a cyberattack, keeping your logs untampered and secure.
About Product
Description
Waterfall Security’s patented BlackBox leverages Waterfall’s-market-leading, hardware-enforced unidirectional technology to securely gather, store, and transmit transaction, logs and other data into a storage repository located securely “behind” a Unidirectional Gateway. All data sent to the storage repository is stored physically outside the monitored network, inaccessible and untouchable.
Inside Waterfall’s BlackBox cyber security incident response solution there is a high-speed, high-capacity logging and analysis system, which can be used to detect attackers’ tracks, attempted changes, manipulation of records and abnormal logging and recording conditions. In time of need, data can be retrieved and inspected securely by physically accessing the BlackBox appliance via the Secure Data Access port. The Waterfall BlackBox faceplate hardware physically blocks the Secure Data Access port when the port is not in use.
Features & Benefits: SECURE STORAGE
Features & Benefits: SECURE STORAGE
- Hardware-enforced unidirectional protection of logged data
- Tamper-proof storage for logs, transactions & configuration files
- Reliable forensics, incident response & recovery, and audits
- Encryption and authentication of logged information
- No possibility of leaking information between sites
- Logs accessed via dedicated out-of-band port
- Powerful graphical data management and retrieval applications
- Full or partial retrieval with search and filter capabilities
- All logs unified and stored in internal relational database
- All recorded data time-stamped and encrypted
- Cyclic & never-overwrite data management options
- Version management for configuration and other files
- Real-time statistics display
- Optional compression
- Syslog, SNMP traps, Windows logs
- FTP, SFTP, CIFS/SMB, drag & drop and many other file sources
- System Backups
- SQL Server, Oracle and other relational databases
- Network traffic and NetFlow statistics
Scheme of work
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief Technical Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
Сonfidential data
Internet access is available for employees
IT Security Department in company
GDPR Compliance
Data Warehouse