Additional Info

CompanyTXOne Networks
Websitehttp://www.txone.com
Company size (employees)100 to 499
Headquarters RegionAsia
Type of solutionSoftware

Overview

TXOne Stellar is an endpoint security solution in the form of pure software, designed solely for OT environments. Stellar integrates with individual devices, becoming a native extension to its base functionalities. With the incredible performance and accuracy that only comes from working so closely with OEMs, Stellar defends modern and legacy devices by actively preventing unauthorized changes to its baseline operations at an application and process level without interrupting normal operations.

OT operations drive business value. Cyber-Physical System downtime cost is always significant. Instead of waiting for a threat to be identified and analyzed before responding, Stellar uses Cyber-Physical System Detection and Response (CPSDR) to prevent all unexpected system changes before they impact the operation.

CPSDR differentiates itself from general detection-and-response solutions with a totally different design angle. It does not rely on cloud intelligence for the reactive actions, but the intel from the operational context. With the application repository maintained in partnership with leading device makers, Stellar removes the burden of manual device identification by incorporating 8000+ apps, devices, and certificates. This ensure the detection tasks in the OT environment are done smoothly, thoroughly, and effortlessly.

One of the major challenges in OT security is to cope with legacy systems. The long lifespan of OT assets elevates this challenge, especially for the ones Microsoft ceased providing security updates. With support back to Windows 2000 and XP, TXOne Stellar supports existing operation no matter where it is in its lifecycle.

For those running TXOne Stellar with suboptimal system resources, a light mode is made available. With this Lockdown mode, Stellar will operate with minimal system resources and perform application whitelisting instead of proactive protection mode. It is noteworthy that Stellar team wrapped this into a universal single installer, and dramatically shortens the deployment complexity.

Key Capabilities / Features

Bringing Operational Focus to OT Security:
The security services that protect IT environments provide a strong foundation for OT, but the security response actions can disrupt operational availability. Stellar avoids this risk by focusing on understanding the operation and its devices and contextualizing them with security outcomes.


[CPS Context-Focused Database]
With the application repository maintained in partnership with leading device makers, Stellar removes the burden of manual device identification by incorporating 8000+ apps, devices, and certificates.
[CPS Detection and Response]
Unexpected changes post potential threats to the operation. By analyzing the fingerprint at the device-agent level, Stellar prevents any unexpected changes to the device, such as malware, unauthorized access, accidental configuration changes, and malicious process modifications.
[Trusted Peripheral Control]
Uncontrolled peripheral devices can impact stability and lead to data loss. Simple-to-configure controls reduce the physical access threat without complicating day-to-day operations.


Uniquely Built For OT:
Protect assets without interfering the operation. Mitigate the environmental barriers to maintain cyber hygiene in OT.


[Broad System Support]
OT assets are designed for long-term operation. With support back to Windows 2000 and XP, Stellar supports your operation no matter where it is in its lifecycle.
[Operationally Safe Response Actions]
With CPSDR incorporating the operational context, Stellar first prevents unexpected device changes to sustain the operation and then moderates response actions to remain operationally safe.


OT Security Without Compromise:
The different objectives and priorities between security and operations teams cause friction and frustration. Stellar removes the need for a compromise by meeting the needs of each team concurrently.


[Proven Security Methodologies]
Behavioral analysis and machine learning models extend detection and identification capabilities beyond known threats. With those, Stellar employs detection and prevention to repel the most advanced cyber threats.


[Multi-Method Threat Defense]
Security defenses take many forms, from pattern matching to configuration lockdown and application use controls. Combining these capabilities enhances overall security coverage.


How we are different

- Security with operational focus


The security services that protect IT environments provide a strong foundation for OT, but the security response actions can disrupt operational availability. Stellar avoids this risk by focusing on understanding the operation and its devices and contextualizing them with security outcomes. The unique CPS Detection and Response (CPSDR) feature prevents unexpected changes to the assets, such as malware, unauthorized access, accidental configuration changes, and malicious process modifications, by analyzing the fingerprint at the device-agent level. Trusted Peripheral Control features also reduce the physical access threat without complicating day-to-day operations.


- Uniquely Built For OT
TXOne Stellar protects assets without interfering the operation and mitigates the environmental barriers to maintain cyber hygiene in OT. OT assets are designed for long-term operation. With support back to Windows 2000 and XP, Stellar supports your operation no matter where it is in its lifecycle. With CPSDR incorporating the operational context, Stellar first prevents unexpected device changes to sustain the operation and then moderates response actions to remain operationally safe. From deployment, supported by a universal installer, to baselining, analysis, and defense, automation and simplicity reduce team resource burdens and skill demands making effective administration a routine task.


- OT Security Without Compromise
The different objectives and priorities between security and operations teams cause friction and frustration. Stellar removes the need for a compromise by meeting the needs of each team concurrently. Behavioral analysis and machine learning models extend detection and identification capabilities beyond known threats. Also, security defenses in Stellar take many forms, from pattern matching to configuration lockdown and application use controls. Combining these capabilities enhances overall security coverage.


  • Vote for this Nomination
    (click the thumbs-up icon to cast your vote)

Browse Award Nominations