https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Cybersecurity


News

JPS enters cybersecurity space with IronGate solution to secure critical infrastructure

JPS enters cybersecurity space with IronGate solution to secure critical infrastructure

  • Written by Donny Jackson
  • 16th March 2022

Historically known for its interoperability solutions, JPS today announced IronGate, the company’s first cybersecurity offering that is designed to prevent hackers from launching cyberattacks against the industrial-control systems that are crucial to the operations of critical infrastructure such as utilities and military facilities.

JPS President Todd Dixon said his company developed IronGate by addressing the well-chronicled cybersecurity problem for critical infrastructure in a unique manner compared to other firms in the sector.

“Our approach is a little different,” Dixon said during an interview with IWCE’s Urgent Communications. “I would say that 99% of the solutions out there are focused on, ‘How do I find a problem, and how do I deal with it after it’s happened?’ Our solution is intent on stopping the problem from ever happening in the first place. That’s where we separate ourselves from the competition.”

“Essentially, where there are industrial controls—and that can be a water facility, wastewater facility, electric system, dams and any commercial equipment that you don’t want to be hacked—this will help avoid that from happening.”

Designed to work with existing supervisory control and data acquisition (SCADA) systems and equipment, IronGate leverages both hardware and software to establish a secure method for the home office of critical-infrastructure entity to communicate with sensors in the field and vice versa (see network diagram above), Dixon said.

In a typical scenario, a JPS Irongate core server would be located at the home office and could be connected to 50 or more IronGate edge devices, each of which would be linked to as many as 100 sensors, according to Dixon.

“The JPS Irongate edge sits out at the site, where the protection is needed,” he said. We put a box in an electric substation, and we connect the items that we don’t want people to [hack] into that box.

“So, what we’re really providing is an absolutely secure connection—between the home office and those sites—that locks the hackers out.”

Dixon said he believe the IronGate approach is superior to the existing technologies employed commonly in the sector.

“Today, people use VPN networks,” Dixon said. “As long as the network is set up perfectly, you’re OK, until someone inside give a key away. If it’s not set up perfectly, once they get into your system, they’re into your entire system—e-mail, finance systems, etc.

“In our cast, even if hackers somehow were able to breach the system, they wouldn’t be able to go past the server at the core. It would never make it back into the regular system.”

At the heart of the IronGate system is a single key that customers will need to guard closely, Dixon said.

“There is a single key that we provide after the system is locked down,” Dixon said. “We ask them to take it and physically put it into a safe.

“For example, if one of our edge units were to fail for whatever reason, they’re going to need to replace it. They will need that [key] to replace it or to make updates. So that, in itself, has its own security to protect the system from people getting into it.”

That applies to all people, including those who work for JPS, Dixon said.

“The other thing that people ask us is, ‘Well, JPS can get into it, right?’ The answer is, ‘No, we can’t,’” Dixon said.

If the key is lost or destroyed, a customer would not have to replace all of its IronGate cores and edge devices, according to Dixon.

“The hardware itself would be good,” he said. “We would just have to come in, reestablish all of the information, recreate the links and set the system up. So, there would be a period where they wouldn’t have our protection.”

IronGate has been beta tested at a major U.S. military facility.

“What we found out was that they had 270 points of contact that were not protected in a way that they should have been, so hackers could get into that,” Dixon said.

“Where we did the beta test, it was one of their newer sites that used a [major carrier’s] secure connection, and we monitored the information coming through. There were attacks that made it through the [carrier] that we stopped.”

In addition, IronGate has been tested in prestigious laboratories.

“We’ve had testing done by four major [entities],” Dixon said. “One is Mandiant FireEye, which was the recommendation from the NSA—they asked us to go to them. They found that the system couldn’t be broken.

“With both [Mandiant] and Cylance [another cybersecurity testing firm], we gave them both hardware and software and asked them to break it. They couldn’t. We even gave them information to help them break it that no one else would have, and they still couldn’t break it.”

Most cybersecurity companies have focused their attention on the lucrative part of the business that tries to protect sensitive documents, but JPS IronGate is designed to secure critical infrastructure that many fear would be prime targets for nation-states to hack as part of larger military attack.

“We’re kind of in a niche market, trying to protect the infrastructure, which we believe is what’s going to be targeted in the next war,” Dixon said. “They’re going to go after these kinds of things to disable you from doing anything … We all know that, without electricity and water, no war is going to go on very long. So, the DoD gets this. They understand that it’s an issue.

“We first thought it would be electrical [plants that would be the primary targets of nation-state attacks during a military conflict]. But after working with the defense agency that we did the beta site with, we found out that wastewater and fresh water is more important. You can store electricity for a while, but you can’t store water that much.”

IronGate’s approach is flexible enough to address the three primary methods that hackers use to attack critical-infrastructure equipment today, Dixon said.

“The worst case would be that you have a system that is not protected at all—which we have seen, in places that kind of scare me, to be honest with you—where the device sitting at a substation of some kind is completely on the open Internet,” Dixon said. “Any hacker can get to that, if they want to, and do whatever they want to it.

“Another is that you have a VPN network that’s established, but it’s not set up properly—it has gaps in the system. That’s a fairly common thing. You think you have everything plugged, and hackers finds their way into the system, plant their [malware] and does their thing. The third would be that you have a good VPN, and it’s fairly well locked down, but you have a rogue employee who hands the keys to someone for some financial gain.

“In all three cases, if you put our device in there, you would stop the hacking of the industrial control.”

JPS expects to begin mass production of IronGate equipment this month, with the core server expected to have a list price of $12,000, while the edge device is expected to cost $13,000, Dixon said. In addition, customers can receive software updates and maintenance services by paying JPS an annual fee that is 17% of the total sales price, he said.

IronGate systems could be used to secure a host of SCADA and IoT-based systems, but Dixon believes it likely will be deployed only in use cases where the risk of being hacked is significant.

“Somewhere, there’s a cutline in all of this process, just based on cost,” Dixon said. “I don’t want to sell something to somebody just to sell it to them. I want it to be a smart sale.”

Dixon acknowledged that developing a cybersecurity solution like IronGate represents a big change for JPS, which has long been recognized as a leader in providing interoperability gateways.

“Quite honestly, it was a tough sell internally, from my point of view,” Dixon said. “[People asked,] ‘Why are you going into cybersecurity? This is a big risk.’ But we know we need to grow, and this is our way to do it.”

Now that IronGate has been developed and is about to hit the market, JPS is faced with the challenge of convincing customers that a company know for enabling interoperable communications also offers a cybersecurity solution that can meet the needs of critical-infrastructure entities.

“That’s the uphill battle we’re fighting, quite honestly,” Dixon said.

 

Tags: homepage-featured-4 Alerting Systems Analytics Applications Companies Critical Infrastructure Cybersecurity Enterprise Federal Government/Military Funding Incident Command/Situational Awareness Internet of Things IoT/Smart X News Policy Public Safety Software State & Local Government System Design System Installation System Operation Tracking, Monitoring & Control News

Most Recent


  • FAA approves beyond-visual-line-of-sight (BVLOS) flights in North Dakota
    The unmanned aerial vehicle (UAV) avionics company uAvionix received Federal Aviation Administration approval to conduct advanced beyond visual line-of-sight (BVLOS) flights of small UAVs in North Dakota.  The flights will be conducted at the Northern Plains Unmanned Aerial Systems (UAS) Test Site (NPUASTS) in Grand Forks, one of seven FAA-run UAV test sites in the U.S., using […]
  • AT&T boasts of core 'white box' success in 5G, fiber push
    AT&T said it has now migrated more than 52% of all of its production traffic onto next-generation “white box” core routers running on products from the likes of Broadcom and DriveNets. The company said its move to such “open” systems has helped its aggressive 5G and fiber expansions. “We announced the next-gen open disaggregated core routing […]
  • Spending American Rescue Plan Act funds: A primer for municipalities
    The American Rescue Plan Act (ARPA) of 2021 is a $1.9 trillion legislative package that includes funding for states, local governments and tribal nations to respond to the economic and public health impacts of the COVID-19 pandemic. While initially restricted, subsequent guidance from the federal government has expanded what those funds can be used for. […]
  • AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections
    AT&T this week reported that FirstNet ended 2022 supporting more than 24,000 public-safety agencies with “about” 4.4 million connections, including 377,000 connections that were added during the last three months of 2022—a total that represents more than half of the carrier’s post-paid wireless growth for the quarter. AT&T officials released these figures in conjunction with […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Vital cybersecurity areas automakers must focus on
  • Stopping Russian cyberattacks at their source
  • JPS enters cybersecurity space with IronGate solution to secure critical infrastructure
    Newscan: Senators ask DHS for strategy to protect U.S. critical infrastructure from Russia
  • Cyber insurance and business risk: How the relationship is changing reinsurance and policy guidance

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

FAA approves beyond-visual-line-of-sight (BVLOS) flights in North Dakota dlvr.it/ShgxHW

30th January 2023
UrgentComm

AT&T boasts of core ‘white box’ success in 5G, fiber push dlvr.it/Shgb4w

30th January 2023
UrgentComm

Spending American Rescue Plan Act funds: A primer for municipalities dlvr.it/ShgZ52

30th January 2023
UrgentComm

AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections dlvr.it/ShY5qH

27th January 2023
UrgentComm

Report: Remote work causing offices to empty, but walkable cities still in high demand dlvr.it/ShXM7Z

27th January 2023
UrgentComm

AT&T FirstNet unleashes robotic dogs for emergency services dlvr.it/ShW7p8

27th January 2023
UrgentComm

Federal agencies infested by cyberattackers via legit remote-management systems dlvr.it/ShVhn3

26th January 2023
UrgentComm

How 5G is making cities safer, smarter, and more efficient dlvr.it/ShVS1h

26th January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.