TXOne Networks solutions secure OT in the production line

TXOne Networks solutions secure OT in the production line
Carl-Johan Dahlgren, TXOne's Business Development Director for Northern Europe, shares the company’s solutions for secure operational technologies

TXOne Networks stands as a specialised OT cybersecurity vendor, singularly focused on fortifying mission-critical operational technologies and infrastructures of paramount significance. Serving manufacturing, oil, gas, electricity, and other production-level technologies, its solutions cover cybersecurity protocols that minimise disruptions to productions and keep digital manufacturing systems online safely. 

Carl-Johan Dahlgren, Business Development Director for Northern Europe at TXOne Networks, shares how various solutions are developed by the company to meet various customer requirements. 

Firstly, the understanding of these technologies is vital, which is where Dahlgren defines IT versus OT and the cyber applications impacting them.

“IT is all about handling information, but OT is operational technology, so everything where you have a physical device doing something. This could be a valve, a motor controlling something—that's operational technology,” says Dahlgren.

The preliminary stage of security OT is understanding the threats around it, which is achieved with the right tools to scan and analyse vulnerabilities. This is where the company delivers products to support clients to implement cybersecurity as a preventative measure. 

“The element portfolio is for scanning assets and inventory to see if you have any malicious code within them. It could be that you want to scan a new machine before you bring it into the production environment.”

Youtube Placeholder

From here, companies can choose from TXOne’s Edge Series of products, which secure solutions at different levels of production and cater for software-driven computer solutions but also legacy systems, making the company inclusive to all different types of hardware. One of these noted by Dahlgren is the Edge IPS—a level two device for securing computers with minimal capability of downloading software from the cloud. 

“The Edge IPS is a layer two device, a physical device that you put in your network to protect machines or computers on which are unable to install any kind of software. This could be very old machines, legacy operating systems, etc,” says Dahlgren. 

“You don’t need to re-architecture the environment since it’s one layer and just a bump in the wire. You can just plug into a physical cable and it begins producing the Edge Series.” 

Dahlgren also mentioned a layer three device, which brings cybersecurity up a notch, creating a firewall for the IT environment. 

“But, you need to take into consideration your network architecture and how to put it in, but it’s to make it possible to protect all customers, regardless of what type of protection they have,” Dahlgren explains.

Understanding the products in practice, Dahlgren cites an example from one of its strategic partners, Sopra Steria, which is one of its most crucial advisors to customers. The company is kept up to date on TXOne solutions to ensure that its customers gain the correct level of insight into the products it provides. 

“They are up to speed and up to date on everything that we have in our portfolio, but also things that are coming around the corner. So, they can advise their customers on the best ways to protect their environments and architecture of the future.” 

 

Click HERE to read the full report

Share

Featured Articles

Gary Merrill: Who Is Commvault’s First-Ever CCO?

Experiencing a period of rapid growth, Commvault have created the new position of CCO and given it to company veteran and former CFO Gary Merrill to lead

Xalient's Stephen Amstutz on Need for Cyber Staff Wellness

Stephen Amstutz, Director of Innovation at Xalient explains why cyber staff are getting stressed and what can be done to help

Worldwide IT Outage Not Cyber Attack - But Software Update

The global IT outage that is being described as one of the biggest ever is thankfully not being attributed to a cyber attack, but rather a software update

Companies Across Cyber Sphere Warn of Surge in DDoS attacks

Cyber Security

UK Takes Steps to Strengthen Country's Cyber Security

Cyber Security

BlueVoyant Launch Platform to Tackle Supplier Attack Surface

Operational Security