Security Experts:

Connect with us

Hi, what are you looking for?



TXOne Unveils New OT Network Security Appliance for SMB Manufacturers

TXOne Networks this week unveiled a new security appliance designed to help small and medium-sized manufacturers protect their operational technology (OT) networks against cyber threats.

TXOne Networks this week unveiled a new security appliance designed to help small and medium-sized manufacturers protect their operational technology (OT) networks against cyber threats.

The new appliance, named EdgeIPS Pro 216, is compact and it can be deployed in a cabinet or IT rackmount.

EdgeIPS Pro 216 The product, advertised as ideal for harsh environments, leverages one-pass deep packet inspection technology, and offers IPS-based network segmentation with ICS/OT protocol filtering. Other capabilities include virtual patching and antivirus scanning.

“By deeply analyzing network traffic on levels 2 through 7 and allowing for interoperability between key nodes, EdgeIPS Pro 216 provides attack information, event logs, early attack detection, and trust list-based filtering of control commands,” TXOne says.

The device has eight sets of paired ports, provides 2Gbps of bandwidth, and supports a wide range of industrial protocols.

EdgeIPS Pro 216 is expected to become available worldwide in July.

TXOne Networks is a joint venture between cybersecurity firm Trend Micro and industrial networking solutions provider Moxa. The new company was announced in November 2018 and unveiled its first product, an IPS, in April 2019.

Related: Trend Micro Unveils New OT Endpoint Security Solution Made by TXOne

Related: Honeywell Launches New OT Cybersecurity Solution for Commercial Buildings

Related: NIST Releases ICS Cybersecurity Guidance for Manufacturers

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).