BlastShield: OT Zero Trust Gateway

Delivering OT Secure Remote Access, Microsegmentation, and Network Cloaking

Start a free trial

Resist AI-Powered Cybersecurity Threats

Cybersecurity threats are becoming more complex and sophisticated as Generative AI (GenAI) proliferates, and traditional security methods like firewalls and VPNs fail to protect OT networks. To tackle these challenges, organizations are eliminating entire classes of risk with BlastShield.

What is BlastShield?

BlastShield is a zero-trust network access solution that helps organizations implement a zero-trust architecture.

Instead of relying on enhanced identity governance (EIG), complex layers of micro-segmentation, or cloud-based gateways, BlastShield utilizes a software-defined perimeter (SDP) approach for more granular access controls and reduced risk from stolen credentials and complex management.

Start a free trial

BlastShield’s OT Cybersecurity Product Suite

BlastShield streamlines OT cybersecurity by delivering an OT Zero Trust Firewall solution that combines the critical capabilities needed for an ICS/OT network. Each component secures network connections with phishing-resistant MFA, data-in-motion encryption, network and device cloaking, and microsegmentation. This Zero Trust solution drastically simplifies the scaling of OT cybersecurity to meet the needs of the largest ICS/OT/CPS networks in the world.

Together, the BlastShield Client, Authenticator, Agent, Gateway Agent, and Orchestrator enable OT cybersecurity protection designed to meet the highest levels of authentication assurance as defined by NIST SP 800-63.

The BlastShield Product suite includes:

BlastShield Gateway Agent Screen

BlastShield

The BlastShield Zero Trust Firewall protects OT enclaves from attacks and enables OT Secure Remote Access. It functions as a Zero Trust gateway, cloaking the OT enclave behind it and protecting the network from AI-enhanced reconnaissance. Once a user authenticates, the gateway microsegments the network to ensure least privileged access for users and prevent lateral movement. The BlastShield Gateway is deployed as a software appliance on any x86 server, cloud instance (AWS, GCP, or Azure), container, and KVM or VMware hypervisor and can operate in high availability mode. 

BlastShield Client

The BlastShield Client is deployed on end-user devices to connect securely to resources protected by BlastShield. The Client is available for Microsoft Windows, macOS, iOS, Linux, and Android and is downloadable via the BlastWave website, Apple App Store, and Google Play store. 

BlastShield Client Screen
BlastShield Authenticator Screens

BlastWave Authenticator

The BlastWave Authenticator delivers biometric or FIDO2 authentication to facilitate AI-resistant passwordless authentication. The Client invokes the Authenticator on a (potentially different) mobile device to authenticate the user. The Authenticator is downloadable via the BlastWave website, Apple App Store, and Google Play store for iOS and Android mobile devices.

BlastShield Agent

The BlastShield Agent enables administrators to lock down critical OT management systems. It functions like a BlastShield Client but can be installed on servers, workstations, remote terminals, or select OT devices to authenticate and secure any connections to the device. Any users connecting to the system must first authenticate themselves with a BlastShield client, and then all connectivity is secured with a Peer-to-Peer VPN connection. The Agent is installed on any IP-connected physical or virtual machine running Linux, Microsoft Windows, or macOS.

BlastShield Host Agent Screen
BlastShield Orchestrator Screen

Orchestrator

The BlastWave Orchestrator provides a single pane of glass to manage all OT network policies, including Users, Agents, Groups, Protocol Policies, Services, and Proxy Servers. The Orchestrator is cloud-based; however, BlastWave enables customers to deploy and self-manage it on-premise to support air-gapped networks and highly confidential data. 

Furthermore, communication can be filtered by IP protocol (e.g. TCP, UDP, HTTPS, etc.). Finally, the Orchestrator can be used to set up Proxies that allow administrators to proxy traffic to specifically configured domains enabling conditional access to cloud applications. The Orchestrator participates in registration and session establishment. The Orchestrator is not an in-line gateway that proxies all traffic like many other SDPs and cloud-based SASE solutions.

The Orchestrator is cloud-based; however, BlastWave enables customers to deploy and self-manage the Orchestrator on-premise to support air-gapped networks and highly-confidential data. The Orchestrator performs the functions of the ZTA Policy Engine (PE) and Policy Administrator (PA).

Together the BlastShield Client, Authenticator, Host Agent, Gateway Agent, and Orchestrator enable security controls that make it easy to set up explicit access between users that have been authenticated using phishing-resistant MFA and agents that have been registered using public key cryptography that meets the highest levels of authentication assurance as defined by NIST SP 800-63.

BlastShield is suitable for implementation on a variety of target devices in IT, OT, and IoT environments. Devices that cannot be installed with a BlastShield Agent can sit behind a BlastShield Gateway, enabling organizations to protect IoT devices, IP cameras, legacy infrastructure, and other constrained devices.

Simple Installation

Windows
Ubuntu Linux
macOs

Game-changing AI-Resistant OT Cybersecurity Capabilities

Network Cloaking

Deploy the BlastShield between the Internet and your OT network, and the devices behind the gateway will be cloaked from the prying probes of cybercriminals and bad actors. Devices behind the gateway cannot be detected with ICMP pings or port scans, as these are all handled by the gateway, obfuscating the secure network. The BlastShield also enforces layer two isolation between the gateway and devices, preventing lateral movements and strictly adhering to endpoint access policies. 

OT Secure Remote Access 

BlastShield and BlastShield Client provide a comprehensive secure remote access solution. They combine to create a robust security perimeter around an organization's network while ensuring that individual endpoints are equally protected and accessible only to authenticated and authorized users. With support for biometric MFA similar to Apple Pay and a patented encrypted Peer-to-Peer tunnel mesh, BlastShield delivers an AI-Resistant secure remote access solution.

Microsegmentation

BlastShield exceeds traditional segmentation by advancing the concept of microsegmentation as a superior security alternative. Unlike broad segmentation strategies, BlastShield’s microsegmentation allows for incredibly detailed control, segmenting networks down to the level of individual devices, systems, protocols, or users. By isolating network segments, BlastShield effectively prevents the lateral movement of threats within the network, a critical defense mechanism against external and internal threats. Policy changes take effect in real-time, facilitating dynamic and flexible policy enforcement during emergencies or administration changes.

BlastWave certified OnLogic CL210G and K410 Gateways

Learn More

Getting started with BlastShield is easy and free.

Getting started with BlastShield is easy and free. Follow the three steps below and get up and running fast.

Create a Free Trial
Account

Download the BlastShield Authenticator & Client

Make Your Host Invisible
In Minutes

Start a Free Trial