By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Next Generation ICS Endpoint Security Solution by Trend Micro

Trend Micro has recently launched first-of-its-kind OT-native endpoint security solution, provided as part of its total security solution for smart factories. Developed by TXOne Networks, TXOne StellarProtectTM is designed to secure all OT endpoints, regardless of environmental conditions, for any mission-critical ICS environment.

CybersecurityThe massive number of ICS endpoints in these working environments provides a large variety of attack surfaces, as they often include many unpatched or otherwise vulnerable devices.

Disruption of these endpoints causes significant problems for manufacturers and can jeopardize the entire operation. According to the Trend Micro 2020 annual cybersecurity report, the manufacturing industry became a primary target for highly infectious ransomware attacks, making it more important than ever to secure these assets with technologies tailored to their purpose.

“The ugly truth of ICS endpoint security is that there has not been any security solution specifically designed for the high-availability needs of modernized equipment in the OT environment,” said Akihiko Omikawa, executive vice president of IoT security for Trend Micro and chairman of TXOne Networks. “Cybersecurity solutions for ICS endpoints must consider three elements to meet industry expectations: low impact to performance, zero interruption, and all-terrain protection.”

The unique needs of the shop floor environment create challenges to finding protections that secure the work site while still giving the necessary priority to performance. Traditional solutions, such as signature-based antivirus, can identify known threats but require constant internet connectivity and frequent updates, which is simply not possible for mission critical assets.

Advanced machine learning-based solutions are able to identify anomalies and unknown threats quickly, but have a high rate of producing false positives that can easily interfere with operations. While application control or lockdown-based solutions are more streamlined and their trust list makes deployment straightforward, they also rigidly limit a machine to a specific purpose and so are only ideal for fixed-use systems. These single technology solutions serve many useful purposes, however are unable to provide the adaptivity necessary to both safeguard and accommodate the operational integrity of assets dedicated to production.

Tags

Nitisha Dubey

I am a Journalist with a post graduate degree in Journalism & Mass Communication. I love reading non-fiction books, exploring different destinations and varieties of cuisines. Biographies and historical movies are few favourites.

Related Articles

Upcoming Events