TXOne Networks’ Edge V2 Engine Delivers Automatic Cybersecurity Rule Generation

TXOne Networks to showcase new Edge V2 engine at SEMICON to better define rules across OT network segments to isolate security breaches.

TXOne Networks’ Edge V2 Engine Delivers Automatic Cybersecurity Rule Generation

IRVING, Texas, & TAIPEI, Taiwan– Industrial cybersecurity company TXOne Networks announces the second generation of its Edge engine for eliminating the spread of operational technology (OT) network infections and safeguarding reliable operations.

Edge V2 delivers automatic rule generation, enabling network segmentation in complex, large-scale OT environments, according to the company announcement.

TXOne Networks will showcase its Edge purpose-built OT security appliances leveraging the new V2 engine in Booth P5322 at SEMICON Taiwan 2023, scheduled for Sept. 6-8 in Taipei.

“Our Edge suite of solutions helps to ensure the reliability, safety and availability of industrial processes and infrastructure by delivering proactive protection of OT assets and eliminating malicious acts during the crucial production stage,” says Terence Liu, chief executive officer of TXOne Networks in the company announcement.

“The introduction of our unique capability for automatic rule generation in Edge V2 is a breakthrough for semiconductor companies and organizations in sectors such as manufacturing, oil and gas, automotive and pharmaceuticals,” he says. “Edge V2 eliminates months of effort in preparing an OT environment for effective network segmentation to keep operations running throughout cybersecurity events.”

The Edge V2 engine enables network segmentation via automated rule generation and learning. The TXOne Networks solution learns from the communications traffic passing through an organization’s network and generates customized OT-protocol trust lists for that specific infrastructure.

Edge V2 is equipped with operation-oriented OT network visibility design and an advanced OT-intelligent policy deployment mechanism. The solution also delivers inline virtual patching for proactive protection from vulnerabilities without operational downtime, form-factor flexibility for building a defense-in-depth posture and deep analysis across a tremendous range of network protocols.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters