Resources
We are committed to making the world a safer place, and we relentlessly strive to innovate and improve our solutions, enabling them to address all challenges of the fast moving Industry 4.0 with the most advanced Cyber Security solutions.
Discover here whitepapers, press releases, tech talks, and news from around the world.
Whitepapers
What is industrial cybersecurity? Simply put, it’s the shield that protects the computer systems and networks that are the lifeblood of vital industries like manufacturing, energy, and transportation. It’s about keeping these sectors safe from the dangerous cyber threats that could cripple their operations.
In terms of cybersecurity, a unidirectional gateway is a network appliance that allows data to flow in one direction only, from a source network to a destination network. This one-way data flow is physically enforced, making it impossible for any data to travel back from the destination network to the source network.
A data diode is a cybersecurity device that ensures secure data transfer. It’s not just another piece of security hardware; it’s a game-changer. Unlike traditional security measures, data diodes offer a unique feature: unidirectional data flow. This means that data can only move in one direction, from the source to the destination, without any possibility of a return journey.
To see is to believe
When talking about data Diodes, a question that people often ask is, “So, what’s the difference between firewalls and Data Diodes?” We say that the two are complementary, as Data Diodes provide additional security measures for especially vulnerable network.
According to ISA62443 specification, any networking component that can be configured dynamically should follow the below…
Discover what risks the OT may pose to itself and to the enterprise
We have always been led to believe that the best way to secure a network, a system, or a subnet is toisolate it from the rest of the network. In short: disconnect it.
Also, we tend to believe OT subsystems are immune from threats because threats will only originate from the enterprise or upstream networks…
Authentication and tracing logs
Misconfiguration is a common issue in network Cyber Security events. They may be caused by intentional or unintentional operator changes, or sometimes by attacks from external networking.
According to ISA62443 specification, any networking component that can be configured dynamically should follow the below…
Case studies

Robust and secured networking solutions for substations
Electricity serves an important part to the economy and to people’s day-to-day activities. A power grid that fails can cause catastrophic damages.

Secure your OT with Data Diode and IDS
Convenience and productivity have introduced more attack vectors to the OT environment and created more opportunities for malicious activities.

Secure your smart grid PLCs
Protecting PLCs in a smart-grid digitalization system. These days, PLCs are more integrated and interconnected with other complex systems and open source solutions.

Securing sophisticated machines with high data transfer rates and complicated protocols
when machines act as the brains for operation and are connected to a lot of industrial devices, a security breach can put the whole operation at stake.

Streamline NERC CIP Compliance with BlackBear Intelligent Gateway
Failure to comply NERC CIP can lead to penalties up to $1 milliion USD per day depending on the violation severity.
News
Updates from us and from the world
BlackBear's observations: Two-way communication can cause possible exposure of critical assets.
BlackBear's observations: Firewalls are inadequate for this type of attack, since the command format itself is valid, even though the value is incorrect.
BlackBear's observations: Data Diodes are used to segment networks in a simple and effective way.
Proven excellence
Penetration tests
Our technology has passed
penetration tests by various
professional laboratories
around the world.
Cybersecurity standards
Our solutions comply with ISA
62443-4 SL3 through two basic
principles, Defense in Depth and
Zones & Conduits.
Industrial grade specifications
Leveraging over 30 years of group
experience, our products run with
industrial-grade EMC and wide
operation temperatures, and can be
deployed in a broad range of harsh
environments.
experience in
industrial networks
validated by renowned
OT cyber security labs
around the world
for software and hardware
Validated by
