Please enable JavaScript in your browser for better use of the website!

OT Micro Segmentation

Bridging OT with IT networks for efficiency benefits

Modern factory robots and machines all get connected to the network to provide statistics and some form of control. These networks are distinctly separated form Information Technology (IT) infrastructure and often referred to as Operational Technology (OT).

Security is taken extremely seriously for these OT network as machine malfunctioning can cause serious accidents in the real-world and result in much more damage than data loss. OT networks have therefor traditionally been totally separated from IT networks. To connect them however has big potential to provide efficiency gains to analyse tuning possibilities, perform predictive maintenance and controlled remote access.

SOLUTION

OT Micro Segmentation

Clavister firewalls for industrial use provide the ideal solution for allowing direct secure connectivity between OT and IT networks. The firewall is configured to be very strict on the specific devices that are allowed on the OT side. The ARP Authentication feature allows authentication of devices and the ability to create specific rules and policies for the same.

Also the Clavister Next-Generation Firewall provides application validation and control functionality to apply policy rules on communication protocols. The user can specify that only protocols like Modbus, OPC or PROFINET, as an example of many, are allowed between segments. In this way it segments the network into zones to simplify policy management and reduce impact upon breach.

The firewall can be configured to allow for communicaiton only in one direction, towards specific IP addresses in the datacenter or cloud. This allows for useage and system status informaiton to be uploaded to the suppliers direclty who can perform preventive maintenance programs and redcue the risk of unscheduled outage.

BENEFIT

1

Prioritize apps critical to
the business

2

Limit access to entertainment or other non-critical sites

3

Block high-risk applications
pro-actively

Use Cases

The following use cases are included in this solution:

Secure Network Zones

Network segmentation to protect company’s digital assets

READ MORE
FW

Firewalling

Network perimeter protection securing IT resources and users

READ MORE

Application Visibility & Control

Control applications and user behaviour to optimize network resource usage

READ MORE

Secure Remote Access

Empowering remote workers and devices with flexible secure access

READ MORE
AC

Active Traffic Optimisation

Traffic prioritisation securing preferred use of resources

READ MORE

Join us! It will only take a minute

DOWNLOAD THE BOOKLETALL USE CASES

Products

Desktop Models

Compact, fast and extremely powerful, these appliances deliver security performance for remote offices or as CPEs.

Rack-mounted Models

For the larger enterprise users, these appliances give best in class protection for even the biggest companies.

Virtual Models

Clavister has been a pioneer in virtual products since 2008. Find out how virtual NGFWs might be the answer for your needs.

Security Subscriptions

Clavister’s services and knowledge products help you realize the full potential of your newly secured network.

Get in touch! It will only take a minute

CONTACT USFIND A RESELLER