Owl Cyber Defense
Secure by Design

Videos, Webinars & Demos

Talking Owl Technology



Owl has consistently led the cybersecurity industry in data diode technology, with the fastest, most advanced, smallest, lightest, and most capable devices in the world.
— Sal Morlando, COO

What Exactly is a Data Diode?

Data Diode Technology, Protecting Your Way of Life

Owl Cyber Defense on Modern Business TV

The Owl ADvantage

#1 | What is a Data Diode?

#4 | Physically Secured

#7 | Unparalleled Scalability

#10 | Multi-Function Solutions

#13 | Fast and Easy Deployment

#2 | Data Diode Vs Firewall

#5 | Complete Separation

#8 | Tested and Accredited Solution

#11 | Defense-in-Depth Built In

#3 | Secure Communication

#6 | Unmatched Performance

#9 | Lowest Total Cost of Ownership

#12 | Long-Lasting and Durable



Best Practices in Cybersecurity for Facilities and Event Centers

Scott Smith provides useful information in preparing your business in securing your facility information appropriately.

See how businesses in every industry have reshaped the way they use data with this cutting edge technology.

Layered Hardware + Software Security Makes for Defense-in-Depth 

Built on a Defense-in-Depth strategy, the OPDS data diode hardware and Talon software operate together in a layered approach to defend both the network and hardware from cyber attacks.

Webinar Details: Tuesday, January 22, 2019 | 10:00am EST 

What you will learn: 

  1. New add on features to support various protocols

  2. Sneak peak of the new intuitive menu design

  3. How to meet NERC-CIP reliability standards

  4. Availability, confidentiality, integrity

Cybersecurity: Trust No One -- Securing 3rd Party Connections to Industrial Control Systems

Your security is only as strong as the security of the 3rd party suppliers, partners, and service providers that you have trusted to access your industrial control network. Unfortunately, these 3rd parties may have less stringent security policies in place, allowing attackers to use these trusted connections to infiltrate your operational network, and the controls, equipment, and data stores within. Through real life case studies and guidance from the DHS, FBI, and NSA, this webinar will analyze the anatomy of attacks through 3rd party connections and outline the best practices and technologies available to help eliminate this significant attack vector.

What you'll learn: 

  1. How bad actors exploit 3rd party connections to infiltrate control system networks

  2. Guidance from the DHS, FBI, and NSA on protecting industrial control systems

  3. Case studies, specific technologies and best practices to secure 3rd party connections

Protecting Industry in the Age of New Threats: Cybersecurity in the Digital Industrial Enterprise

We teamed up with Smart Industry for a webinar on the security essentials for industrial operations: Protecting Industry in the Age of New Threats. In the webinar, we discussed the evolving vision of an end-to-end security architecture, including various technologies and strategies to protect valuable systems and equipment while allowing digital applications, processes, and data sharing to flourish.

What you'll learn:

  1. How to augment security with layers of defense

  2. How to implement cybersecurity training

  3. Best way to secure the digital industrial enterprise

  4. How to thoroughly vet incoming files & portable media





Mark S. Toussaint | 2019 ARC Advisory Group Interview | Cybersecurity

Dennis Lanahan | 2018 ARC Advisory Group Interview | Cybersecurity

Mike Timan | 2018 Cyber Defense TV Interview | Securing Critical Infrastructure


Video Product Demonstrations

Resetting a OPDS-100D Unit

OPDS-100D Rockwell Automation Data Transfer Demonstration

OPDS-1000 Real-Time One-Way Data Transfer Over a Data Diode Demonstration

OCDS-ST06 Real-Time Streaming Video Transfer Solution Demonstration