Data Diode Products
What is Owl Data Diode
Data Diode Purpose
Yes, data diodes can be implemented in a specialized configuration to facilitate two-way data transfers, while still providing hardware-enforced network segmentation. Owl’s ReCon is a highly tailored, proven hardware-based cybersecurity solution utilizing two independent one-way paths in a single unit, with each path protected by a data diode. However, the transfer can only be initiated from the “high” security side of the network connection. This approach enables network segmentation, remote command and control, remote monitoring, and SCADA data replication, with significantly less risk than a standard software firewall.
Can data diodes be used for two-way data flows?
Yes, data diodes can be implemented in a specialized configuration to facilitate two-way data transfers, while still providing hardware-enforced network segmentation. Owl’s ReCon is a highly tailored, proven hardware-based cybersecurity solution utilizing two independent one-way paths in a single unit, with each path protected by a data diode. However, the transfer can only be initiated from the “high” security side of the network connection. This approach enables network segmentation, remote command and control, remote monitoring, and SCADA data replication, with significantly less risk than a standard software firewall.
Data Diode Products by Form Factor
OPDS - 100
Multi-purpose, Medium Throughput
OPDS - 1000
Multi-purpose, High Throughput
EPDS
Multi-purpose, Very High Throughput
PaciT
Raw Ethernet Packets, Very High Trougput
XD Guardian
Multi-purpose, Bidirectional, Filtering
OPDS - 100D
Multi-purpose, Industrial Form Factor
DiOTa
Single Protocol, Lower Througpu
Recon™
Bidirectional, Secure Command & Control
SSUS
The Owl Perimeter Defense Solution (OPDS) product line is designed to support the Critical Infrastructure markets. These cybersecurity products are oriented around protecting the data networks and digital assets (SCADA, PLCs, DCS, databases, historians, etc.) located at various critical infrastructure facilities including plants, mines, power plants, banks, substations, credit unions, pump stations, oil rigs, etc.
The concept is to protect the control systems within the facility by creating a secure cyber perimeter around the plant so that plant operations are not interrupted, sabotaged or otherwise impacted by some kind of cyberattack. The concern is not only for threats against single facilities (i.e. a nuclear power plants, refineries) but also a coordinated, simultaneous attack that shuts down multiple power substations, freshwater delivery systems or bank branches for example; leading to significant stress, disorder, and in the minds of the attackers, chaos.