Q: Will Protect still work in port?
A: PROTECT client software runs on your on-board PCs and protects them no matter what internet connection you are using – including switching to a local Wi-Fi in port to save cost. You will still be protected by the same industry-leading protection.

Q: Can you test ships at sea?
A: SCAN can be performed against any vessel with an internet connection, to give you a hacker's-eye view of the vulnerabilities of your systems.  For best results we will assign an expert testing crew onboard your ship when it is back in port to run TEST to ensure we obtain a 360-degree view of all your systems.

Q: Will it defend me against all security threats?
A: PROTECT is intended to defend you against cyber threats from your internet connection.  It does not defend you against accidental or deliberate actions by your onboard crew who have direct access to your IT systems.  We recommend TRAINING for your crew – this helps them understand how to work safely on computer systems to help you manage your risk.

Q: Am I defended against zero-day threats?
A: A zero-day threat is an attack against a vulnerability previously unknown to security researchers.  Because it uses industry-leading security software backed by an international team of security researchers, we have some of the best protection from zero-day in the business:our threat intelligence partner research team is amongst the top performers in detection of and protection against new threats.   This gives us unparalleled speed in rolling out enhanced protection against new threats.

Q: Is the Protect gateway secure?
A: PROTECT runs on an operating system designed to meet the security requirements of governments and large corporations, certified to FIPS 140-2 and Common Criteria EAL4 CC standards. It runs in a high-availability resilient configuration in data centers certified to ISO 27001 and subject to regular SOC-2 audits.

Q: What happens if I am attacked?

A: While it significantly reduces your risk, no security is 100% effective and attacks will very occasionally get through.  In a crisis response situation, crisis communications  and legal teams are ready to provide a quality response, our cyber security response team can advise remotely or be deployed to the nearest port (at additional cost), and insurance policies to cover losses (within coverage limits).

Q: Why is your gateway on shore, not on the vessel?

A: Managing security onshore gives significant operational and safety benefits.  By managing security across your fleet in one place, we can update protection swiftly and effectively when new attacks are discovered – and every second counts. We can ensure consistent coverage, so no boat gets left behind. And by taking your gateway off the bridge, we guard against accidental disabling of your security by any untrained crew.

Q: Do I need to protect my operational technology systems?

A: Yes – these can be the most safety-critical systems on board and therefore they represent the highest risk from cyber-attack. An attack on a crew PC will cause unwanted business disruption, but an attack on a navigation system or a ballasting system could put the vessel and its crew in immediate danger.  In recent years, hackers have been increasingly targeting SCADA systems, the industrial control systems that manage operational technology onshore and offshore, and many of these legacy protocols were designed in the years before security became an issue.