Jun 01, 2023 • 3 min read
EdgeIPS Pro Series
EdgeIPS ensures the security of individual assets and small production zones through hassle-free transparent deployment, providing OT visibility and OT protocol filtering with the option of inline or offline functionality.
This security solution is designed specifically to fit into your network without disturbing your pre-existing configurations.
– Customize your own security rules with a variety of user-defined conditions to best fit your industry.
– Integrate the commonly-used ICS protocols with security rules to optimize the protection for your OT networks.
– Shield your network with customizable, real-time threat detection by recognizing the same IP/MAC addresses, protocols or port numbers with the pre-defined suspicious objects.
– Define your thresholds for flood/scan attacks and block subsequent anomalous packets once an attack is detected to ensure uninterrupted service.
– Protect your network against the latest malware variants, spyware, and other content-level threats and reduce the risk of data breach or damage caused by malware infection.
– Defend legacy production networks and unpatched devices against known threats with up-to-date vulnerability filtering rules and virtual patching.
– Segment OT network to eliminate the spread of infections and ensure reliable network traffic.
– The streamlined system dashboard provides the operators with an overview of the security appliances and full control over the entire system.
– EdgeIPS provides a high-level overview of all connected assets in the production environment, for comprehensive visibility.
– EdgeIPS presents all the traffic passing through, with real-time details such as bandwidth usage and traffic applications.
– When a failover occurs on EdgeIPS Pro, the standby EdgeIPS Pro device will take over and become the active one.
– When a failover occurs on EdgeIPS, the port pairs can bypass the packets without impacting the connectivity.
– When a failover occurs on the switch where EdgeIPS Pro connects to, an alternative route to the standby switch will be activated through the neighbouring port.
– Use our central management system, EdgeOne, for security management in compliance with manufacturing SOP to centrally monitor operation information, update network protection policies, and set patterns for attack behaviors.
– Flexibly switch between Monitor and Prevention modes, providing greater flexibility and ease of integration to preserve your productivity while maximizing security.
– EdgeIPS’ hassle-free device onboarding process facilitates quick, effortless deployment of devices on a massive scale within the production network.
– Leverage the power of rule auto-learning to seamlessly transform your everyday network traffic into robust access policies, unleash effortless policy deployment, maintain firm control over your networks, and fortify your cyber-defenses, all at your fingertips.
EdgeIPS Pro Series
EdgeIPS Series
EdgeIPS LE
We look forward to hearing from you! To send us your questions, fill out this form. A member of the TXOne team will get in touch shortly.
Learn more about how TXOne’s OT zero trust approach can help you keep the operation running.
News
Jun 01, 2023 • 3 min read
Blog
May 31, 2023 • 12 min read
Blog
May 30, 2023 • 16 min read
TXOne’s solutions are designed to deploy on levels 1 (basic control), 2 (supervisory control) and 3 (site manufacturing operations and control) of the Purdue model.