參展品牌
TXOne Networks
TXOne Networks
03-578-7068

睿控網安為全球工控資安領導廠商,專注於OT零信任資安架構,提供全方位解決方案以提升系統穩定度與安全性,以避免擾亂運營、損壞資產並使人的生命處於危險之中,同時降低場域運作遭受駭客攻擊或病毒感染的風險。睿控網安技術橫跨嵌入式作業系統、病毒、網路威脅、工控程式與服務、以及工控網路協定等。所有系列產品是以利於OT環境方便部署為主要設計導向、可運用在不同使用環境。旗下三大系列產品包含資安檢測裝置設備、工控端點防毒軟體、以及工控網路硬體防護設備皆內建AI學習、以統合資訊至OT零信任資安管理平台以補強工業控制網路環境運作要求、進而維護企業運營不中斷為主要宗旨。

產品類型

  • ICS/SCADA Security
  • Network Firewall
  • Vulnerability Assessment
  • Endpoint Protection

產品功能

  • 網路入侵防禦系統(NIPS)
  • OT 資安防禦
  • 次世代網路入侵防禦系統
  • OT 或工業級防火牆
  • 安全檢測與防護技術
  • 系統漏洞檢測
  • 端點設備防護
  • 勒索軟體防護
  • 窗口 Joy Chen 陳乃禎
  • 電話 03-578-7068 ext.5102
  • 信箱
https://www.txone.com/
1
2
3
SPEECH
演講議程
5 月 10 日 (三) 10:40 - 11:10
企業全面數位化後的資安新思維

隨著物聯網、人工智慧、及5G等技術薦臻成熟,數位化已然成為成功企業必要的競爭力,也因此提升資安能量並擴張防線已經是刻不容緩的避險舉措。產業進行數位化的過程中經常思考如何在資安與營運的天平的兩端取得平衡。然而位處於攻擊端的駭客們除了採取集團化的方式建構網路犯罪產業鍊之外,同時也是利用新科技發動攻擊的先行者。特別是數位化的過程中採用物聯網裝置成為數位資產應用的場景下,企業將面對更加複雜而且艱難的挑戰。過往企業只需專注於電腦、伺服器、及雲端服務的保全,這樣的資安能量配置忽略了物聯網可能造成的資安破口,也無法有效保障其他與運營相關的數位資產。本次的分享將談到企業如何在數位化的過程中調整資安策略,並拓展資安防禦及偵測的邊界以確保企業營運韌性。

顯示更多
睿控網安 執行長
  • TOPIC
    大會主題演講
  • LOCATION
    臺北南港展覽二館 7F 701
  • TAGS
    Enterprise Security
    OT Security
    Industrial Security
SOLUTIONS
解決方案

The foundations of any smart factory are its data collection, data sharing, and data analysis, which are often complicated by the inclusion of assets from a wide range of manufacturers that work in a wide range of conditions and situations. Using the OT zero trust approach, inspect assets as they arrive and segment the network with all-terrain hardware to secure dataflow at the shop floor level (data in use, data in transmission, and data at rest). OT-native technology supports technicians to centrally manage cyber defense of even a vast number of legacy and modern assets running side-by-side without interrupting operations.

Streamline cyber defense procedures to prioritize patient outcomes and reduce cyber defense workload throughout healthcare facilities. Shield legacy Windows endpoints at the endpoint and network level to stop cyber attacks from disrupting patient care or compromising sensitive information. Block suspicious behavior on the network with protocol- and IP-based trust lists, and reinforce security for insecure protocols such as HL7 and DICOM.

Increase visibility, mitigate cyber risk, and prevent cyber incidents in your manufacturing, refinement, and distribution processes with the OT zero trust approach. Base cyber defense policy on protocols unique to oil & gas, including DNP3, OPC UA, and others. IoT sensors and other monitoring technologies add convenience but create more opportunities for attackers to compromise work sites. Through security inspection, network segmentation, trust listing, and asset shielding, we can mitigate cyber threats while protecting your bottom line.

Attackers want power over inverters and other devices used to generate electricity. They are looking for one open security hole on a flat network or unpatched legacy equipment to grant them free access to shut off electricity and demand a ransom. Learn more about the 4 cornerstones of OT zero trust join forces to shield power generation systems from malicious disruption.

WHITE PAPERS
解決方案白皮書
Cyber Defense for Semiconductor Foundries: Safeguarding Digital Innovation

A cyber attack on a semiconductor fab can cause tens of millions of dollars in damages to the stakeholding organization in less than a day. The damages of disruption by malware or Advanced Persistent Threat (APT) groups are difficult to overstate: far-reaching effects ripple out, afflicting every downstream link in the supply chain and in essence forcing global progress to run backwards. The introduction of a new set of comprehensive standards, as well as the gear for maintaining these standards, will be what provides wafer fabs with the security necessary to create the technologies of the future.

The OT Zero Trust Guide to Compliance with the NIS Regulations

As cyber-physical systems become increasingly advanced and interdependent, they will only become more critical to the prevention of cyber disasters. Going well beyond the mere protection of personal data, these regulations reinforce the availability, integrity, and confidentiality of systems and networks.

Read The OT Zero Trust Guide to Compliance with the NIS Regulations today for insight from TXOne’s applied researchers on how to streamline compliance with the NIS regulations, reducing resource cost and overhead.

Mitigating Cyber Risks in Automotive Supply chain: An Analysis of ISO/SAE 21434 Guidelines

This publication aims to explore the impact of the automotive industry cybersecurity management guidelines and standards WP.29/R155 and ISO/SAE 21434 surrounding the automotive supply chain. This article provides security guidelines for automobile production to prevent the introduction of vulnerabilities and threats into the production process. This publication will cover the following aspects:

Cybersecurity challenges faced by automotive suppliers and manufacturers

An overview of WP.29/R155 and ISO/SAE 21434 and their significance in the automotive industry

Analysis of these regulations’ requirements and guidelines for ICS/OT cybersecurity in the automotive supply chain

Exploration of the best practices and strategies for compliance with ISO/SAE 21434

3 OT Zero Trust Defenses for SMB Manufacturing

Due to the costly nature of replacing equipment, many SMBs will opt to keep their legacy equipment despite the fact that they cannot be updated or have security patches funneled to them through the internet. In this white paper, we alert you to the dangers you might face and provide steps you can take to protect your enterprise. The key defenses are:

1. Harden endpoints before attackers can strike.

2. Use a handheld rapid scan device to cover inbound and air-gapped devices.

3. Segment the network.

Read 3 OT Zero Trust Defenses for SMB Manufacturing for more information on modern threats to SMBs and elaboration on these forms of defense.

OT Zero Trust Boosts Healthcare Cybersecurity

Medical devices are often highly specialized and costly. They need robust endpoint cyber hygiene that stops known attacks, guards against zero-day hacks, and avoids future assaults. The modern hospital requires that can handle cybersecurity issues without creating challenges that could lead to poor patient outcomes.

VIDEO
解決方案影片
TXOne OT-Native All-Terrain Solutions

TXOne’s solutions meet the unique needs of diverse ICS verticals in device inspection, endpoint protection, and network defense to secure your OT workforce, workload and workplace. Our solutions are designed to deploy on levels 1 (basic control), 2 (supervisory control) and 3 (site manufacturing operations and control) of the Purdue model.

TXOne OT Zero Trust

TXOne OT Zero Trust video explains the differences why IT Zero Trust can't apply in the OT. IT Zero Trust focuses on user credentials, while OT Zero Trust focuses on asset to ensure asset security using a zero-trust approach; never trust, always verify, by offering three mainstream solutions: Network Defense, Endpoint Protection, and Security Inspection for asset lifecycle protection. The technique that uses AI to build an OT Zero Trust Platform with situation awareness is TXOne answer to OT Cybersecurity.

Portable Security Series - Security Inspection for workforce

Ensure asset integrity with rapid, installation-free asset and device scans, allowing for defense of air-gapped environments and improved supply chain security.

TXOne Edge Series - Network Defense for workplace

Minimize the impact of cyber incidents with OT-native network segmentation. Cover vulnerabilities in unpatched and legacy endpoints with asset shielding.

TXOne Stellar Series - Assets Protection for workload

Ensure the productivity of the assets by ICS adaptive endpoints cybersecurity solution for legacy and modern operation system.