Secure Delivery of a Payload via a Protocol Break

Secure Delivery of a Payload via a Protocol Break October 2014 A secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the protocol. Attackers wishing to...

Diodes are Diodes, Guards are Guards

Diodes are Diodes, Guards are Guards September 2014 Over the last 3-5 years Data Diodes have grown in popularity as a solution for moving data between isolated networks. With this has come creative marketing to leverage the term ‘Diode’ for solutions that...

Diode Applications: Secure Printing

Diode Applications: Secure Printing November 2013 In this blog series, I have been exploring applications for Data Diodes.  This week, I look at the issue of printing between different networks. Printing is an everyday necessity for businesses. In order for employees...

Diode Applications: Secure Network Monitoring

Diode Applications: Secure Network Monitoring October 2013 For the third article in the Data Diode blog series, I explore Audit and Monitoring between Domains. Monitoring activity in a network is critical to maintain the availability of systems and reduce the...

Diode Applications: Secure Windows Updates

Diode Applications: Secure Windows Updates August 2013 In this blog series, I have been exploring applications for Data Diodes.  This week, I look at the issue of getting Windows Updates into a segregated network — securely. It is widely reported that 80% or higher of...

What is the difference between a Guard and a Gateway?

What is the difference between a Guard and a Gateway? August 2013 Guards and gateways are full application layer proxies that connect to two or more networks. They accept data passed on an inbound network interface, ‘process it’, and then pass data to the outbound...