InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

[German] Legacy Systeme - Die Gefahr in meiner OT-Umgebung

Presented by

Mirco Kloss, Business Development Director DACH, TXOne Networks

About this talk

In today's industrial environments, there are still many old and therefore easily vulnerable legacy systems. These will also continue to exist for the next few years. The runtimes in OT are designed for many years and a replacement or a software update or patch is not so easy to do in these 24x7 environments. Not to mention the costs of the downtime required for this or to completely replace and renew such a system. This is why our customers rely on OT-native endpoint protection that requires few resources and can therefore run on old and new operating systems. Furthermore, it enables installation and updates without restarting the asset and is also fully functional on-premise, without a permanent internet connection to the cloud. This protects your OT environment while also protecting your investment, as legacy systems can continue to be operated securely for longer.
TXOne Networks Europe

TXOne Networks Europe

2921 subscribers29 talks
Keep the operation running.
TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customised technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defence-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats.
Related topics