Waterfall Security Solutions and Thuthukani Technology Solutions (2TS) partnered to help secure OT networks across Africa. Waterfall Security Solutions is a leading provider of OT Security, with a range of unbreachable Unidirectional Security Gateways that enable safe IT/OT integration. 2TS is a South African-based cybersecurity solutions provider with a focus on managing endpoint security.
The convergence of Information Technology (IT) and Operational Technology (OT) continues to blur traditional boundaries of cybersecurity. As organizations struggle to integrate their OT and IIoT data and assets with IT-based business automation, the importance of securing OT systems and networks has never been more pronounced. Waterfall’s hardware-enforced Unidirectional Security Gateways enable OT data to flow out to customers, vendors, and IT systems, without letting any information or attacks back into OT systems. The gateways enable new business efficiencies with IT automation accessing OT data, without providing any access to the OT systems that are the sources of that data.
“At 2TS, we often talk about our customer’s success being our success. This partnership not only marks a pivotal moment in our offering, but also in the security posture of our customers.” explained Charl van Niekerk, CEO of 2TS, “By recognizing the growing significance of OT/IT integration as entire industries move away from air gaps, 2TS and Waterfall’s partnership emerges as a strategic move to fortify this essential function across Africa. We are incredibly excited for what this partnership has in store. 2TS’ localized offering alongside Waterfall’s extensive experience in the OT security space will help us to continue protecting critical infrastructure.”
“We are delighted to partner with such an experienced and respected cybersecurity provider in South Africa.” said Lior Frenkel, CEO of Waterfall Security, “We are looking forward to providing 2TS’s client base with a fully secure and unbreachable approach to IT/OT integration.”
As this partnership goes into effect, we encourage industrial operations on the African continent that need to enable more efficient and effective operations without increasing opportunities to cyberattacks to contact 2TS and learn more about how they can continue to secure OT systems, while allowing for one-way, unidirectional, and unbreachable flows of OT data into IT systems and automation.