logo slogan

Floodgate Security Framework

The Floodgate Security Framework (FSF) provides a building blocks for creating secure embedded devices. Floodgate Security Framework modules are availabe as individual products or as an integrated framework for embedded Linux or any RTOS.

 

Overview

 

Floodgate Security Framework (FSF) provides engineers developing embedded devices a comprehensive security solution allowing them to build secure, authenticated, trusted devices.

IT security practices require endpoints to be authenticated, trusted, secured and managed before they are allowed to operate on the corporate network. IT/OT convergence and the emergence of security standards in various industries requires embedded devices provide the same security capabilities as IT devices.

The Floodgate Security Framework provides:

 

Management system integration for IT/OT convergence.
Security capabilities to ensure the device is protected from attack.
Building blocks for compliance with security standards including EDSA, ISA/IEC 62443 and NIST Cybersecurity guidelines.

 

 

Floodgate Security Framework Modules

 

Floodgate™ Firewall, an award winning embedded firewall, provides Stateful Packet Inspection (SPI), rules-based filtering and threhold-based filtering to protect embedded devices from Internet-based threats.

 

Floodgate™ Intrustion Detection Software (IDS) provides a critical, missing layer of security for embedded devices. Floodgate IDS protects RTOS and embedded Linux device from malicious or accidental changes to firmware, configuration information or static data.

 

Floodgate™ Secure Boot ensures only authenticated firmware from the OEM is allowed to run on the device.

 

Floodgate™ Agent provides situational awarness, security event reporting, command audit log support and security policy management for embedded and IoT devices. Floodgate Agent provides management provides integration with the enterprise security management systems.

 

Floodgate™ McAfee ePolicyOrchestrator agent provides integration between RTOS-based devices and the McAfee ePO and ESM enterprise management systems.

 

Cyber Threats for Embedded Devices

Internet-based attacks are on the rise and an increasing number of these attacks are targeting embedded devices. Cyber-criminals, hacking bots, industrial or international espionage agents and even terrorist groups are now targeting industrial, military, automotive and medical devices as well as utility systems.

 

Reported attacks against industrial devices include:

Automotive manufacturing plant shutdown resulting from a cyber-attack.
Pipeline monitoring system that failed due to a DoS attack.
Train system delays caused by hackers.
Sewage spill caused by a control system hacked by an insider.
Proliferation of malware targeting industrial automation systems including Stuxnet, Flame, Havex and BlackEnergy.

 

Floodgate Modbus/TCP Packet Filter

Floodgate Modbus Packet Filtering extends the Floodgate Firewall, adding protection for devices using Modbus/TCP. It provides control over the Modbus packets sent to an embedded device.

Read more about Floodgate Modbus/TCP Packet Filter


Floodgate IDS

Floodgate™ Intrusion Detection(IDS) provides a critical, missing layer of security for embedded devices. Floodgate IDS protects RTOS and embedded Linux device from malicious or accidental changes to firmware, configuration information or static data.

Read more about Floodgate IDS


Floodgate for ePO

Floodgate™ ePO Agent enables embedded devices to integrate with the McAfee ePO and SIEM management systems allowing them to operate as trusted, managed network elements. The embedded OSes used in IoT and embedded devices don’t support the McAfee agent. The Floodgate Agent is a portable, lightweight alternative enabling integration of embedded device with the McAfee enterprise security management systems.

Read more about Floodgate for ePO


Floodgate Secure Boot

Floodgate™ Secure Boot provides a critical security feature for embedded devices by ensuring that only validated code from the device OEM is allowed to run. This prevents attackers from replacing firmware with versions created to perform malicious operations.

Read more about Floodgate Secure Boot


Floodgate Agent

Floodgate™ Agent, a component of the Floodgate product family, provides management of security policies for an endpoint device. Floodgate Agent provides support for local managent interface (Web and CLI) or can be integrated with the enterprise management system of your choice to provide management of filtering policies for Floodgate Defender.

Read more about Floodgate Agent


Floodgate Firewall

Floodgate™ Firewall, an award winning embedded firewall provides Stateful Packet Inspection (SPI), rules-based filtering and threhold-based filtering to protect embedded devices from Internet-based threats. Protocol filters add Deep Packet Inspection (DPI) for Industrial Automation Protocols.

Read more