Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

TXOne Networks Unveils First Industrial Cybersecurity Product

TXOne Networks, a joint venture between cybersecurity firm Trend Micro and industrial networking solutions provider Moxa, this week unveiled its first product, an industrial intrusion prevention system (IPS).

TXOne Networks, a joint venture between cybersecurity firm Trend Micro and industrial networking solutions provider Moxa, this week unveiled its first product, an industrial intrusion prevention system (IPS).

Trend Micro and Moxa announced the launch of TXOne Networks in November 2018. The new company focuses on industrial internet of things (IIoT) security and it will offer gateways, endpoint agents and network segmentation solutions designed to help organizations secure, control and monitor equipment and operational technology (OT).

TXOne productTXOne Networks on Wednesday announced that it’s showcasing the beta version of its first product, an industrial IPS, at Hannover Messe, a trade show for industrial technology taking place this week in Germany.

According to the company, the product includes virtual patching capabilities designed to protect vulnerable OT devices, detection and blocking mechanisms for worm-style threats, and protocol whitelisting controls for APT and denial-of-service (DoS) attacks that may exploit legacy equipment lacking proper authentication.

The software, which can be managed from a central console, runs on industrial-grade hardware designed to withstand significant temperature fluctuations, TXOne said.

Learn More About Industrial Security Products at SecurityWeek’s 2019 ICS Cyber Security Conference

“In five short months since formalizing our industrial security joint venture, we are happy to show-off our solution for tackling security weaknesses prevalent across industrial environments,” said Eva Chen, CEO of Trend Micro. “We listened to the needs of both leading manufactures and critical infrastructures operators then harvested the best intellectual property existing within the partner companies. The result is a customized answer that goes beyond traditional security tools to mitigate the complex challenges.”

Trend Micro, which is the majority partner in TXOne, has conducted several studies on the threats faced by industrial organizations. The company’s most recent reports focus on the risks associated with machine-to-machine (M2M) protocols, long equipment life cycles in the manufacturing industry, internet-exposed HMIs, and the use of old RF protocols.

Advertisement. Scroll to continue reading.

Related: Claroty Adds New Capabilities to Industrial Security Platform

Related: Several Industrial Automation Products Affected by WibuKey DRM Flaws

Related: New Splunk IoT Solution Helps Secure ICS

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...