Contact Us
Contact Us
Customer Download Center
  • English
  • Products
  • Industry Solutions
  • Resources
  • Partners
  • Company
  • Threat Intelligence
Product Portfolio
txone-product icon-inspection-B

Security Inspection

  • Trend Micro Portable Security™ 3
  • Trend Micro Portable Security™ 3 Pro
txone-product icon-endpoint-B

Endpoint Protection

  • Stellar™
txone-product icon-networking-B

Network Defense

  • OT Defense Console™
  • EdgeIPS™
  • EdgeIPS™ Pro
  • EdgeIPS™ Pro 216
  • EdgeFire™
icon-expert-blackicon-expert-blackicon-expert-black

Never trust, always verify

Learn more about how TXOne’s OT zero trust approach can help you keep the operation running

Contact us
Solution Overview
  • Smart Factory
  • Healthcare
  • Oil & Gas
  • Green Energy
icon-expert-blackicon-expert-blackicon-expert-black

Never trust, always verify

Learn more about how TXOne’s OT zero trust approach can help you keep the operation running

Contact us
All Resources
  • Getting Started
  • Videos
  • Blog
  • Security Reports
  • White Papers
  • Case Studies
  • Data Sheets
  • Webinars
  • Primers
icon-expert-blackicon-expert-blackicon-expert-black

Never trust, always verify

Learn more about how TXOne’s OT zero trust approach can help you keep the operation running

Contact us
Why TXOne
  • Leadership
  • Events
  • News
  • Careers
  • OT Threat Research
  • Legal
icon-expert-blackicon-expert-blackicon-expert-black

Never trust, always verify

Learn more about how TXOne’s OT zero trust approach can help you keep the operation running

Contact us
  • IoT/ICS Threat Atlas
  • Threat Encyclopedia
icon-expert-blackicon-expert-blackicon-expert-black

Never trust, always verify

Learn more about how TXOne’s OT zero trust approach can help you keep the operation running

Contact us
  • en
Contact Us

An In-Depth Look at OPC-UA Cyber Threats – Part 1: Introduction to OPC-UA

An In-Depth Look at OPC-UA Cyber Threats – Part 1: Introduction to OPC-UA

March 29, 2023

Find out more

Mitigating Cyber Risks in Automotive Supply Chain-An Analysis of ISO-SAE 21434 Guidelines

Mitigating Cyber Risks in Automotive Supply Chain: An Analysis of ISO/SAE 21434 Guidelines

February 7, 2023

Find out more

OT Zero Trust Drives Automobile Quality

OT Zero Trust Drives Automobile Quality

September 2, 2022

Find out more

Mission-critical OT cybersecurity news and threat mitigation straight to your inbox

Newsletter

By submitting this form you confirm that you agree to the storing and processing of your personal data by TXOne Networks as described in our Privacy Policy

  • Products
  • Trend Micro Portable Security™ 3
  • Trend Micro Portable Security™ 3 Pro
  • Stellar™
  • OT Defense Console™
  • EdgeIPS™
  • EdgeIPS™ Pro
  • EdgeIPS™ Pro 216
  • EdgeFire™
  • Industry Solutions
  • Smart Factory
  • Healthcare
  • Oil & Gas
  • Green Energy
  • Resources
  • Getting Started
  • Videos
  • Blog
  • Security Reports
  • White Papers
  • Case Studies
  • Data Sheets
  • Webinars
  • Primers
  • Company
  • Why TXOne
  • Partners
  • Events
  • News
  • Contact
  • OT Threat Research
  • Knowledge Base
  • Legal
TXOne Networks Get in touch
Youtube logo and link Twitter logo and link Linkedin logo and link

© 2023 TXOne Networks. All rights reserved. Privacy Policy | Terms of use

Honored Member of

Global Cybersecurity Alliance
  • Product Portfolio
    • Security Inspection
      • Trend Micro Portable Security™ 3
      • Trend Micro Portable Security™ 3 Pro
    • Endpoint Protection
      • Stellar™
    • Network Defense
      • OT Defense Console™
      • EdgeIPS™
      • EdgeIPS™ Pro
      • EdgeIPS™ Pro 216
      • EdgeFire™
  • Industry Solutions
    • Smart Factory
    • Healthcare
    • Oil & Gas
    • Green Energy
  • Resources
    • Getting Started
    • Videos
    • Blog
    • Security Reports
    • White Papers
    • Case Studies
    • Data Sheets
    • Webinars
    • Primers
  • Company
    • Events
    • News
    • Partners
    • Careers
    • OT Threat Research
    • Knowledge Base
    • Legal
  • Threat Encyclopedia
  • IoT/ICS Threat Atlas
  • Webinar
Threat Encyclopedia Live IoT/ICS Threat Atlas Webinar Contact Us

Deployment Model

TXOne’s solutions are designed to deploy on levels 1 (basic control), 2 (supervisory control) and 3 (site manufacturing operations and control) of the Purdue model.

Security Inspection
1 3
Select All Unselect All
  • Trend Micro Portable Security™ 3
  • Trend Micro Portable Security™ 3 Pro
  • Management Program
Endpoint Protection
1 2
Select All Unselect All
  • TXOne StellarProtect™
  • TXOne StellarOne™
Network Defence
1 4
Select All Unselect All
  • OT Defense Console™
  • EdgeIPS™
  • EdgeIPS™ Pro
  • EdgeFire™

Download TXOne’s Deployment Model

Get your copy