May 31, 2024
Never trust, always verify
Learn more about how TXOne’s OT zero trust approach can help you keep the operation running.
EdgeIPS ensures the security of individual assets and small production zones through hassle-free transparent deployment, providing OT visibility and OT protocol filtering with the option of inline or offline functionality.
This security solution is designed specifically to fit into your network without disturbing your pre-existing configurations.
The granularity of controls enables more detailed security policies and rules to elevate the security level.
In case of security compromise, the containment is made easier with microsegments to reduce lateral movements.
The process of segmenting increases the understanding of the asset inventory and network flows.
The granularity of security control can filter commands based on operational context and reduce human errors.
You can equip two EdgeIPS Pro devices at the same time, so they become a backup for each other.
All EdgeIPS devices are equipped with packet bypassing features to ensure stable connectivity in all conditions.
EdgeIPS Pro devices can smartly create an alternative route even when the connected switch has a port failure.
Defend operational networks and devices against threats with industrial-grade intrusion prevention mechanisms.
Master numerous ICS protocols with security rules to optimize the protection for your OT networks.
Establish network segments for security configurations with detailed granularity. This is key to ensuring a reliable OT network.
EdgeIPS comes in multiple form factors for the optimized deployment in terms of budget, capability, complexity, or architecture.
Customize security rules by MAC or by IP addresses. Incorporating both L2 and L3 policies ensures wide asset security coverage in the OT network.
Shield your network with customizable, real-time threat detection by recognizing suspicious objects in the network.
Define your thresholds for flood/scan attacks and block subsequent anomalous packets once an attack is detected to ensure uninterrupted service.
Protect your network against the latest malware variants, spyware, and other content-level threats. (Exclusive to EdgeIPS Pro)
The streamlined system dashboard provides the operators with an overview of the security appliances and full control over the entire system.
EdgeIPS provides a high-level overview of all connected assets in the production environment, for comprehensive visibility.
EdgeIPS presents all the traffic passing through, with real-time details such as bandwidth usage and traffic applications.
Monitor operation information, update network protection policies, and enforce security rules all in a single EdgeOne console.
Choose between Monitoring or Prevention modes to optimize productivity and security level.
The EdgeIPS onboarding flow facilitates quick, effortless deployment of devices on a massive scale within the production network.
Utilize AI engine to create security baselines and create corresponding security rules to dramatically reduce the configuration hassles.
![]() EdgeIPS Pro Series | ![]() EdgeIPS | ![]() EdgeIPS LE |
We look forward to hearing from you! To send us your questions, fill out this form. A member of the TXOne team will get in touch shortly.
Learn more about how TXOne’s OT zero trust approach can help you keep the operation running.
TXOne’s solutions are designed to deploy on levels 1 (basic control), 2 (supervisory control) and 3 (site manufacturing operations and control) of the Purdue model.