Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Trend Micro Unveils New OT Endpoint Security Solution Made by TXOne

Cybersecurity firm Trend Micro on Monday announced a new endpoint security solution developed by TXOne Networks for devices in operational technology (OT) environments.

Cybersecurity firm Trend Micro on Monday announced a new endpoint security solution developed by TXOne Networks for devices in operational technology (OT) environments.

Launched in 2018 as a joint venture between Trend Micro and industrial networking solutions provider Moxa, TXOne offers solutions for protecting industrial control systems (ICS) against cyber threats.

The new solution, TXOne StellarProtect, is designed to protect OT endpoints against malware and other threats without requiring an internet connection. StellarProtect includes anti-malware, threat scanning, application and certificate inventory, anomaly detection, unauthorized USB device blocking, and integrity protection capabilities.

The company says its new product leverages machine learning and ICS root of trust, which collects more than 1,000 software certificates and licenses and verifies them.

Learn More About ICS Security Products at SecurityWeek’s ICS Cyber Security Conference and SecurityWeek’s Security Summits Virtual Event Series

Another endpoint protection product provided by TXOne is StellarEnforce, which secures legacy industrial systems by only allowing pre-approved applications and services to run.

Related: Trend Micro Launches New ICS Security Solutions

Related: TXOne Networks Unveils First Industrial Cybersecurity Product

Related: Vulnerabilities in TBox RTUs Expose Industrial Organizations to Remote Attacks

Related: Industrial Firms Informed About Serious Vulnerabilities in Matrikon OPC Product

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.

ICS/OT

A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

ICS/OT

Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.

ICS/OT

Schneider Electric in recent months released patches for its EcoStruxure platform and some Modicon programmable logic controllers (PLCs) to address a critical vulnerability that...