Osprey Cyber Security Platform
Our all in one appliance to address your every maritime cyber security requirement
Winner: Most Innovative Tech Solution Award 2023
Onboard Cyber Security Platform
CND have been providing cyber security onboard superyachts for many years and in order to address some of the issues found, we have developed a cyber security appliance called Osprey. This next generation, all in one device, fulfills numerous cyber security functions.
Osprey can be deployed physically or virtually depending on your infrastructure. The reduced size of this appliance also makes it perfectly suited for use on smaller superyachts and support vessels.
Osprey can be installed in a short depth 19" communications rack, such as can be found on a bridge or as used for audio visual equipment.
Osprey - Keeping An Ever Watchful Eye On Your Vessel
Installation of Osprey couldn't be more simple, this greatly reduces the need for our engineers to go onboard and the installation can even be undertaken during the season.
We send the preconfigured Osprey (physical or virtual) to you, or your Maritime IT Managed Service Provider.
You install it and connect it to your network (instructions provided).
Osprey will then securely connect to our Cyber Security Operations Centre (CSOC) in the Isle of Man.
Our engineers will then fine tune the configuration, remotely.
Pivotal to Osprey is our Cyber Security Operations Centre which is located in the Isle of Man.
Our cyber security engineers maintain Osprey remotely and our analysts monitor the security events and respond to any attacks.
Once Osprey is successfully deployed, we will advise you on how to send events from your various onboard devices to enable log collection, normalisation and enrichment.
Alternatively, you can provide us with a username and password and we will log onto your devices from Osprey and configure them to send events.
As soon as Osprey starts to receive events, we will start to monitor your ship for security events.
Osprey will scan the vessel and identify any digital assets and can alert when critical assets disappear, or new assets are introduced.
The asset list produced is really valuable to the ETO/AVIT
Osprey uses cyber threat intelligence to check the reputation of every event, this will be reported on if they are suspicious.
Osprey has 3 inbuilt network Intrusion Detection Systems available to monitor your networks with extraordinary detail for attacks, far beyond the capabilities of many firewalls.
Note: this will require additional network configuration.
Optional Extra - Osprey has an inbuilt vulnerability scanner, which will regularly scan all of the internal digital devices for vulnerabilities.
Osprey communicates with our Cyber Security Operations Centre, if the ship has limited external bandwidth eg. VSAT, our Osprey communications can be managed so as not to consume too much bandwidth at peak times.
Osprey has a number of cyber incident response tools built in, enabling our Team to investigate an incident, should one occur.
Osprey can be updated remotely with bandwidth consumption being carefully managed.
If Osprey is no longer required, it can be remotely wiped of sensitive data before it is returned.
Osprey has an embedded next generation firewall which not only protects itself, but can be used to monitor and if required, control remote access to Operational Technology.
Monitoring multiple superyachts as a fleet, eg. for a yacht management company, not only results in huge financial savings, but also results in a single operational cyber security picture.
Our Cyber Security Operations Centre will scan the external network addresses of the ship identifying any vulnerabilities using the same tools and techniques as a hacker.
Where internal or external vulnerabilities are discovered and the impact of their exploitation is unknown, our Penetration Testers can attempt to exploit them.
Through the use of an agent on crew work computers we can continue to keep a watchful eye on for any nefarious activity even whilst they are away from the vessel.
Off ship cloud capabilities such as Microsoft Office 365 and Google Workspace (formerly G Suite), AWS, Azure, etc. can be monitored for cyber security activity in the cloud rather than the ship.
Our analysts monitor the dark web looking for the crew's credentials which might have been compromised through a breach of a public network, such as LinkedIn or MyFitness Pal. These credentials may then be used by criminals to breach other systems.
Cyber criminals will often register a domain which is lexically similar to the ship domain, in order to trick crew and suppliers into being victims.
We monitor all new domain registrations and report any which are lexically similar and make recommendations to reduce the risk.
We also monitor those domains which pose a threat for the activation of a website which might be used to target the ship's clients, suppliers and crew.
CPU 16 Cores
The Osprey appliance is a short depth 1U appliance