Security Solutions

Complete security

Antivirus protection and proper installation can greatly increase the digital security on board your vessel. However, they do not protect against every different threat and scenario that can target your vessel.If for some reason the Antivirus were bypassed, disabled or malfunctioning, this would leave your vessel unprotected against anything threatening its digital security. Data theft nowadays could have potentially disastrous consequences and should be prevented at all costs. Therefore adding another layer of security is not only something to consider, it is a vital part of securing your vessel. Port-IT provides a number of products and services to further improve on your vessel’s security.

WatchGuard Advanced Firewalls

Most vessels nowadays are equipped with a basic firewall that provides simple protection by closing unused internet ports. With the increasing number of applications used on a vessel, the number of ports opened is also increased, diminishing the effectiveness of this method of security.
WatchGuard firewalls are a more advanced security measure; not just unused ports are closed, but all traffic going over the firewall is monitored, in various manners. This way it can be controlled to prevent unwanted outside access and data usage.

The most important security measures featured on the WatchGuard product provided by Port-IT are:

  • Packet Filtering – Automatically stops traffic from dangerous sources and controls internet access on a group or personal basis. All while maintaining good throughput speeds and the option for secure VPN connections

  • Application control – Controls which applications can access the internet to prevent malicious or inappropriate applications from causing inconvenience or even damage on the systems on your vessel. All while maintaining a high level of adaptability so the programs you actually need keep working flawlessly.

  • Intrusion Protection Service (IPS) – Monitors traffic and system activities in order to give you real-time protection from spyware and all matter of network-, application- and protocol-based attacks. WatchGuard IPS makes sure your network stays free of unwanted access and wards off all attacks.

  • Data Loss Protection – Prevents sensitive information being leaked to outside your network, ranging from personally identifiable information, financial or cargo data or security protocols. Scans data from more than 30 file types to a degree that suits your needs.

  • APT Blocker – Blocks advanced malware and zero-day attacks, no matter how sophisticated they are and keeps your vessel safe from hard to get rid of malicious programs.

DESlock provides full security for all data on your system including:

  • Full Disk Encryption (Pro version only)

  • Removable Drive Encryption

  • DESlock Go Portable Encryption

  • File and Folder Encryption

  • Email Encryption

  • Virtual Disks & Encrypted Archives

DESlock data encryption by ESET

Preventing access to your systems is the best course of action to take when improving security for your company and on board your vessels. No barrier is impregnable however, and without encrypting your files, anyone breaking into your system could access all data without limitations.

DESlock data encryption secures all your data by encrypting it, making it accessible only by those in possession of the correct encryption key or password. The level of encryption is completely customizable, varying from encrypting single files or folders to encrypting your entire hard drive, including any external USB drives.Encryption of your email messages is also a possibility, making it virtually impossible for anyone to intercept your confidential correspondence.
Using DESlock data encryption properly makes your sensitive data useless to anyone who is not authorized to access it, further enhancing the security on board your vessel.

Penetration Testing

A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, service and application flaws, improper configurations, or risky end-user behaviour. Such assessments are also useful in validating the efficiency of defensive mechanisms, as well as end-user adherence to security policies.

Penetration tests are typically performed as follows: Using manual or automated technologies, servers, endpoints, web applications, wireless networks, network devices, mobile devices and other potential points of exposure are systematically compromised. Once vulnerabilities have been successfully exploited on a particular system, testers may attempt to use the compromised system to launch subsequent exploits at other internal resources, specifically by trying to achieve incrementally higher levels of security clearance and deeper access to electronic assets and information via privilege escalation.

Information about any security vulnerabilities successfully exploited through penetration testing is typically aggregated and presented to IT and network systems managers to help those professionals make strategic conclusions and prioritize related remediation efforts. The fundamental purpose of penetration testing is to measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved resources or operations.

Why perform Pen Tests on your network?

Besides the obvious issue of data leaks when your network is compromised, security breaches and any related interruptions in the performance of services or applications can result in direct financial losses, threaten organizations’ reputations, erode customer loyalties, attract negative press, and trigger significant fines and penalties. Besides avoiding the financial losses, you can be sure that during any claim, you have tried everything within the possibilities to avoid such theft. As with maritime cybercrime becoming a serious point of topic, it is good to avoid becoming a victim of these attacks, which can easily be prevented most of the time.  

StorageCraft backup solutions

Sometimes data loss due to mechanical failure is inevitable. Any computer can break down without warning. However, when this happens it is extremely important to have a recent backup of all your data available so that downtime, loss of documents, correspondence and associated loss of revenue are brought to an absolute minimum.
StorageCraft Backup & Recovery by ESET is a professional backup solution that makes the process of backups and recovery when needed a process of minutes rather than hours or days.
StorageCraft creates sector-level backup images of a disk drive. This means the backup does not only contain data, but also the operating system, applications, services and configuration files. This ensures that if a calamity happens, your vessel is up and running again in the shortest amount of time possible.

The backup solution supports backups to any medium and the backup process can be scheduled on regular intervals by the user. Backup files can be made incremental, making the process extremely quick after the initial backup. Even though the entire disk is backed up, individual files can be restored from a backup image within minutes. Backups can be transferred between physical and virtual environments without issue, making your data easily available, even if the physical system is no longer working.

If desired, backups can be performed without notification to the user, so the chances of interruption are much smaller, resulting in a reliable backup chain.

Disaster recovery is a crucial part of maintaining your vessel’s operational availability. StorageCraft Backup & Recovery by ESET provides a complete solution, while maintaining ease of use and the flexibility that is desired.