TXOne Networks solutions secure OT in the production line

Carl-Johan Dahlgren, TXOne's Business Development Director for Northern Europe, shares the company’s solutions for secure operational technologies

TXOne Networks stands as a specialised OT cybersecurity vendor, singularly focused on fortifying mission-critical operational technologies and infrastructures of paramount significance. Serving manufacturing, oil, gas, electricity, and other production-level technologies, its solutions cover cybersecurity protocols that minimise disruptions to productions and keep digital manufacturing systems online safely. 

Carl-Johan Dahlgren, Business Development Director for Northern Europe at TXOne Networks, shares how various solutions are developed by the company to meet various customer requirements. 

Firstly, the understanding of these technologies is vital, which is where Dahlgren defines IT versus OT and the cyber applications impacting them.

“IT is all about handling information, but OT is operational technology, so everything where you have a physical device doing something. This could be a valve, a motor controlling something—that's operational technology,” says Dahlgren.

The preliminary stage of security OT is understanding the threats around it, which is achieved with the right tools to scan and analyse vulnerabilities. This is where the company delivers products to support clients to implement cybersecurity as a preventative measure. 

“The element portfolio is for scanning assets and inventory to see if you have any malicious code within them. It could be that you want to scan a new machine before you bring it into the production environment.”

From here, companies can choose from TXOne’s Edge Series of products, which secure solutions at different levels of production and cater for software-driven computer solutions but also legacy systems, making the company inclusive to all different types of hardware. One of these noted by Dahlgren is the Edge IPS—a level two device for securing computers with minimal capability of downloading software from the cloud. 

“The Edge IPS is a layer two device, a physical device that you put in your network to protect machines or computers on which are unable to install any kind of software. This could be very old machines, legacy operating systems, etc,” says Dahlgren. 

“You don’t need to re-architecture the environment since it’s one layer and just a bump in the wire. You can just plug into a physical cable and it begins producing the Edge Series.” 

Dahlgren also mentioned a layer three device, which brings cybersecurity up a notch, creating a firewall for the IT environment. 

“But, you need to take into consideration your network architecture and how to put it in, but it’s to make it possible to protect all customers, regardless of what type of protection they have,” Dahlgren explains.

Understanding the products in practice, Dahlgren cites an example from one of its strategic partners, Sopra Steria, which is one of its most crucial advisors to customers. The company is kept up to date on TXOne solutions to ensure that its customers gain the correct level of insight into the products it provides. 

“They are up to speed and up to date on everything that we have in our portfolio, but also things that are coming around the corner. So, they can advise their customers on the best ways to protect their environments and architecture of the future.” 

 

Click HERE to read the full report

Share

Featured Articles

Keeper: Cutting-Edge Cybersecurity for Williams Racing

Cybersecurity firm Keeper Security has partnered with Williams Racing to provide advanced solutions to protect the Formula 1 team’s critical data

Norton: Report Highlights Rising Trend of AI Dating Scams

Norton report shows that as AI becomes more sophisticated and accessible, so do the risks of romantic scams conducted via AI

Barracuda: Why Businesses Struggle to Manage Cyber Risk

Barracuda Networks CIO report shows that six in 10 businesses struggle to manage cyber risk, with issues such as policy struggles and management buy-in

Evri, Amazon and Paypal Among Brands Most Used by Scammers

Cyber Security

Tech & AI LIVE: Key Events that are Vital for Cybersecurity

Technology & AI

MWC Barcelona 2024: The Future is Connectivity

Technology & AI