by Petra | Aug 7, 2023 | Use Case
Secure system integration poses a challenge to any organisation. The information exchange must follow the organisation’s policy where threats towards the systems have been encountered for. It is critical that the information flow is controlled to limit attack vectors....
by Petra | Aug 6, 2023 | Use Case
Providing secure and selective access to a system from a remote network is a challenge. The access must be adapted based on defined policies and tuned for the specific systems. It is critical that the sensitive information stays within the protected network and that...
by Petra | Aug 5, 2023 | Use Case
Energy plants such as wind farms and utilities rely on data from outside management systems. These systems include virus protection and software updates, but also other crucial information, to work at maximum potential. The information transfer to and from the system...
by Petra | Aug 4, 2023 | Use Case
Power plants and other utility companies need continuous monitoring systems to send commands and receive other information such as system logs or process information. Validation of incoming connections and information flow is critical to mitigate cybersecurity...
by Petra | Aug 3, 2023 | Use Case
Government agencies, law enforcement bodies and civil departments are all faced with the dilemma of checking personal information while complying with national and international regulations regarding data leakage. Information transfer is often performed using manual...
by Petra | Aug 2, 2023 | Use Case
How can you protect your facility from cyber-threats? Yet remain efficient and continue to guarantee operational uptime? In this Use Case you will find out how data diodes meet this challenge. Previously, utilities such as nuclear power stations, electricity...