Additional Info

CompanyTXOne Networks
Websitehttp://www.txone.com
Company size (employees)100 to 499
Headquarters RegionAsia

Overview

TXOne Edge is a family of network security appliance designed specifically for the OT environments. It consists of IPS product line and NG-Firewall product line, and a web-based management console.

TXOne Edge ensures the security of individual assets and small production zones through hassle-free transparent deployment, providing OT visibility and OT protocol filtering with the option of inline or offline functionality. This security solution is designed specifically to fit into your network without disturbing your pre-existing configurations.

Equipped with deep packet inspection engine capable to analyze 200+ ICS protocols, Edge is built specifically to address OT security needs from the networking aspect. On top of the network-based security capabilities such as visibility and active protection, the crown jewel of Edge is its AI-based policy management capabilities.

Security policy configuration, particularly in OT environments, is essential not only for cyberthreat prevent but also for the elimination of operational error by human. However, it is also the most challenged area in OT. Understaffing of security personnel is a common issue among all OT environments, while the quantity of assets can be enormous. Installing network security hardware take long enough but configuring them to function as expected takes way longer. The mission of Edge is to solve the long-standing issue. The AI-based security automation tools are capable to create policies automatically based on operational baselines and dramatically shorten the deployment process. In a real case of a car manufacturing factory, Edge shortens the deployment time from 6 months to 2 weeks.

TXOne Edge is well recognized in manufacturing areas especially in semiconductor and automotive verticals because the assets are extremely valuable and requires the top level of protection and management capabilities. The multitudes of models also enable the flexibility and adaptivity for users to plan their budget-capability matrix.

Key Capabilities / Features

Micro-segmentation :
the presence of network micro-segments with granular security controls is fundamental for organizations, especially in OT environments when the network is often designed flat. This feature category includes:
- Reduce Attack Surface
- Mitigation of Incidents
- Transparency and visibility
- Eliminate Human Errors


Ultimate Operational Continuity:
Business continuity is crucial for maintaining business stability, protecting reputation, complying with regulations, and ensuring customer satisfaction. In OT, this is paramount for network security products. This category includes following features:
- High Availability
- Multi-layered Fail Safe Designs


OT-Centric Security Design:
General-purpose security products offer only a standard level of protection across all aspects. Our goal is to achieve perfection by focusing exclusively on OT security and vertical insights in technology, processes, and people.
- OT-native design
- Network segmentation with granular configurations
- Comprehensive models to choose from


Purpose-built OT Security Capabilities:
EdgeIPS is designed for practical security needs in OT.
Its intelligent security mechanisms and the asset-focused features are tailored to the unique needs of OT environments, ensuring that the organizations are protected from a wide range of threats.
- Extensive reach with L2/L3 packet support
- Anomaly detection and prevention
- Malware landing prevention


Holistic Visibility into OT Network:
Prior to safeguarding your assets, it's essential to possess the capability to monitor all OT assets within the network. This includes tracking data flow, protocol commands, and connection details.
- Central dashboard
- Network map
- OT traffic clarity


Empowering Usability:
Understaffing security experts remains a prevalent challenge in maintaining cyber hygiene within OT. This underscores the importance of integrating robust technologies seamlessly into user-friendly experiences.
- Centralized management console
- Flexible operation modes
- Easy Onboarding and Deployment
- Adaptive baseline calibration


How we are different

- Network security built specifically for OT


The IPS rules applied on micro-segmented network not only reduce the attack surface but also mitigate the impact scope upon cyber incidents. The ICS-dedicated policies not only elevate the security level but also eliminate human operational errors. The management console also offers holistic visibility for OT environments and all connected assets within.


- Operational continuity driven by product design
Nothing should jeopardize operation continuity in OT environments and security makes no exception. TXOne Edge not only ensures the optimal network throughput with powerful hardware but also offers multiple layers of fail-safe implementations. The fail-safe design covers the failure of an Edge port pair, the entire Edge appliance, and even the external network switch that Edge is attached to. TXOne Edge smartly create an alternative route when the connection is disrupted, in order to remain operational continuity.


- Asset visibility with visualization
TXOne Edge offers granular and comprehensive asset visibility of your production environment, empowering the asset managers to closely monitor the ICS assets by specific vendor, software, device, and most importantly, by communications traffic. With the micro-segmentation and security policies visualized, Edge enables users to streamline management efficiency.