Cyber threats are just as much a risk on your leisure vessel as they are on shore. To protect your data, you need to have an understanding of the cybersecurity landscape and visibility of your operations, coupled with the right technologies, policies, procedures, and controls.
Security is a cornerstone of our business. Marine connectivity is not just the vessel piece, but everything that happens on shore too. SD has invested more into network infrastructure than any other service provider in the industry. Our robust infrastructure combined with our multipoint solutions approach to cybersecurity and certified experts give you confidence that the vessel network and passenger data are safe, no matter when or where you are sailing.
Certified and Compliant
Why traditional antivirus is not enough
- Targeted attacks can bypass blacklisted URLs, sidestepping traditional antivirus technologies, deploying phishing attacks, breaching security, and stealing data.
- Most data breaches are through customized malware attacks. Polymorphic malware targets outdated software, and users enable the attack. Basic antivirus software detection is bypassed with such attacks.
- Antivirus software does not address ransomware, which hold a victim’s data hostage. The result is that user devices including PCs, tablets and phones can be locked down making them unusable.
- Good antivirus software analyzes complex file behavior and blocks threats but is unlikely to protect against increasingly sophisticated threats like rootkit malware, where attackers hide embedded routines in system files.
- Social engineering, which manipulates users into revealing sensitive information or to click certain links. Threats are often disguised as official emails from familiar sites, like Facebook, ecommerce sites, etc.
Monitors incoming and outgoing traffic and helps detect external attacks trying to execute a malicious action on the vessel network. This allows our security experts to respond, avoiding and/or stopping the attack.
Unlike typical antivirus, SD’s are dynamically updated to help prevent a malicious action that can put your data at risk. Files received via email, USB device or direct internet download are targets of this technology which scans unencrypted traffic for viruses and malicious content, and blocks them, mitigating risk.
Detects and blocks exploit attempts and evasive techniques on both the network and application layers, including port scans, buffer overflows, and protocol fragmentation. This technology alerts our team that a hack is happening, so we can take immediate steps to stop it and track down the root cause.
Blocks highly evasive exploits like polymorphic malware, and instantaneously identifies existing malware variants. Unlike some malware solutions, we use heuristics – behavior-based scanning – and sophisticated machine learning techniques to analyze and pinpoint malicious files, eliminating traditional reliance on signature databases.
This filtering protects computer users from viewing inappropriate web sites and content, while preventing access to known malware hosts, reducing risk and making the network safer.
Our cyber security experts use evidence-based information to identify vessel network threats, while helping to mitigate exposure to them. We analyze and prioritize global and targeted threats to proactively prevent attacks.
With level 2, all your vessel’s data traffic bypasses public routing over the internet. We can then provide highly customized solutions to best meet the needs of your mission.
- Encrypt and protect traffic from intercept by foreign entities.
- Provides secure encrypted and accelerated tunnel for all traffic to and from the vessel
- Per device threat detection, blocking, and correlation of events.
- Traffic is anonymized and egressed out one of SD’s secure Point of Presence (PoP) locations.
- Monitored and supported by the SD Incident Response team
- Customized aircraft network configuration.
- Separate WiFi network SSIDs based on passenger and data priority.
With SDPN, you make your vessel onboard network operate as an extension of your office or home.
- Custom vessel network configuration based on corporate security policy and compliance requirements.
- Separate WiFi network SSIDs for corporate, guest and other networks.
- Traffic encrypted and delivered to your corporate network allowing you to manage the network the way you want to.
- Guest and other non-corporate traffic is still interrogated for malicious activity.