Industrial Network Security
ICS purpose-built protection and segmentation
What is your concern?
Vulnerability Protecsion
Segmentation
Policy enforcement
Vulnerability Protecsion
Protect critical assets or legacy devices from vulnerability attacks and network worms.
Deploy a transparent network security device in front of critical assets, enabling vulnerability protection by virtual patching without changing logical network configuration.
Segmentation
Suppress spread of a cyber incidents, like network worm propagation, in a flat network.
- Deploy a transparent network security device in front of uplink port of existing L2 network switches, enabling secure network segmentation by firewall and protocol filter without changing logical network configuration.
- Establish a new network segment by deploying a secure network device with routing, firewall, virtual patching, and protocol filter capabilities.
Policy enforcement
Prevent vulnerability attacks, unauthorized accesses, and/or unintended control commands to critical assets from RTUs or IoT gateways.
Deploy a transparent network security device in front of RTUs/IoT gateways, enabling policy enforcement by firewall, virtual patching, and protocol filter without changing logical network configuration.