How to Add Protected Endpoints on Blast Shield System

In this quick video, we will add protected endpoints on a blast shield system.
Start the process on the appropriate blast shield security gateway.
Manually. Adding a single endpoint requires only its unique name and IP address on the underlay network.
The orchestrator creates this endpoint as a protected host behind the selected blast shield gateway and assigns it an overlay IP address.
But what if one has many endpoints to add to blast shield?
Perhaps a list sourced from a separate scanning or a threat detection system while open API connections may be used.
The blast wave Orchestrator also makes this operation simple by ingesting comma separated values.
To import your endpoints from CSV, upload the data file to the orchestrator, making certain to select the correct separator character If needed, deselect the header line, then choose at least the name and destination columns.
The system parses the data and adds each row as a new blast shield endpoint.
Blast Shield makes adding cybersecurity easy, even to a large number of running systems without any adverse impact on your production.

Experience the simplicity of BlastShield to secure your OT network and legacy infrastructure.

Schedule a Demo