Trend Micro Industrial Network Security
ICS purpose-built protection and segmentation
Vulnerability protection
Protect critical assets or legacy devices from vulnerability attacks and network worms.
Deploy a transparent network security device in front of critical assets, enabling vulnerability protection by virtual patching without changing logical network configuration.
Segmentation
Suppress spread of a cyber incidents, like network worm propagation, in a flat network.
Deploy a transparent network security device in front of uplink port of existing L2 network switches, enabling secure network segmentation by firewall and protocol filter without changing logical network configuration.
Policy enforcement
Prevent vulnerability attacks, unauthorized accesses, and/or unintended control commands to critical assets from RTUs or IoT gateways.
Deploy a transparent network security device in front of RTUs/IoT gateways, enabling policy enforcement by firewall, virtual patching, and protocol filter without changing logical network configuration.