Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

TXOne Networks Unveils First Industrial Cybersecurity Product

TXOne Networks, a joint venture between cybersecurity firm Trend Micro and industrial networking solutions provider Moxa, this week unveiled its first product, an industrial intrusion prevention system (IPS).

TXOne Networks, a joint venture between cybersecurity firm Trend Micro and industrial networking solutions provider Moxa, this week unveiled its first product, an industrial intrusion prevention system (IPS).

Trend Micro and Moxa announced the launch of TXOne Networks in November 2018. The new company focuses on industrial internet of things (IIoT) security and it will offer gateways, endpoint agents and network segmentation solutions designed to help organizations secure, control and monitor equipment and operational technology (OT).

TXOne productTXOne Networks on Wednesday announced that it’s showcasing the beta version of its first product, an industrial IPS, at Hannover Messe, a trade show for industrial technology taking place this week in Germany.

According to the company, the product includes virtual patching capabilities designed to protect vulnerable OT devices, detection and blocking mechanisms for worm-style threats, and protocol whitelisting controls for APT and denial-of-service (DoS) attacks that may exploit legacy equipment lacking proper authentication.

The software, which can be managed from a central console, runs on industrial-grade hardware designed to withstand significant temperature fluctuations, TXOne said.

Learn More About Industrial Security Products at SecurityWeek’s 2019 ICS Cyber Security Conference

“In five short months since formalizing our industrial security joint venture, we are happy to show-off our solution for tackling security weaknesses prevalent across industrial environments,” said Eva Chen, CEO of Trend Micro. “We listened to the needs of both leading manufactures and critical infrastructures operators then harvested the best intellectual property existing within the partner companies. The result is a customized answer that goes beyond traditional security tools to mitigate the complex challenges.”

Trend Micro, which is the majority partner in TXOne, has conducted several studies on the threats faced by industrial organizations. The company’s most recent reports focus on the risks associated with machine-to-machine (M2M) protocols, long equipment life cycles in the manufacturing industry, internet-exposed HMIs, and the use of old RF protocols.

Related: Claroty Adds New Capabilities to Industrial Security Platform

Advertisement. Scroll to continue reading.

Related: Several Industrial Automation Products Affected by WibuKey DRM Flaws

Related: New Splunk IoT Solution Helps Secure ICS

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.