Manage Cyber Risk With Micro-Segmentation

Simplify and Protect your OT Environment

software defined networking

Optimize your industrial control system with micro-segmentation

As OT teams strategize against increasingly sophisticated cyber threats, technological innovation has created new possibilities to manage cyber risk through software-defined micro-segmentation. From visibility across the organization to standard policy deployment and management, businesses have new tools to defend their ICS attack surface.

Introducing the Veracity OT Network Controller for ICS Networks

The Veracity OT Network Controller is a revolutionary product simplifying and streamlining the process of maintaining and managing cyber risk with industrial operational networks.

Offering

Standard Network Solutions

SMB
  • Drastically simplified network architecture
  • Deny by default
  • Rules learning engine
  • Network asset management
  • Network visibility
  • Legacy network connectivity support
  • Time based rules
  • RESTful API (Programmatic Integration)
  • Redundant network controller
Popular

Tiers

Enterprise Network Solutions

Enterprise
  • Drastically simplified network architecture
  • Deny by default
  • Rules learning engine
  • Network asset management
  • Network visibility
  • Legacy network connectivity support
  • Time based rules
  • RESTful API (Programmatic Integration)
  • Redundant network controller

Why Veracity

With cyber-attacks on the rise and Ethernet networks growing in complexity, the ability to find and retain OT expertise is also a major challenge. The Veracity OT Network Controller, an OT-optimized SDN controller, enables consolidated management of the industrial control network and is designed to follow rule-based, zero-trust cybersecurity best practices. The outcome is a micro-segmented OT network that is proactive, resilient, and isolated.

The Veracity platform eliminates the need for traditional networking tools – like VLANS, ACLs, spanning trees, and others. Leveraging software features like automatic identification of EtherNet/IP devices not only reduces the potential for human-created network and security issues but also eases the implementation process so your network downtime is minimal.

Implement micro-segmentation to manage cyber risk in your OT Network

The Veracity OT Network Controller ensures that devices on the network cannot communicate with other devices without explicit permission. Historically, devices are separated by physically or virtually segmenting the network, which is complicated, time-consuming, and expensive. By eliminating the manual aspect, the Veracity solution system reduces the cost of a traditional networking project by roughly half and will not decay over time. In addition, with a micro-segmented network you can:

  • streamline network segmentation projects by deploying policy-based network communications
  • block and isolate all unknown traffic to prevent further network infiltration
  • remain compliant and aligned with NIST CSF and other Cyber Standards

Veracity allows for enterprise-wide network visibility and management

Over the last decade, IT and OT teams are working together to solve business problems, especially when it comes to networks and managing cyber risk. The OT network needs robust management tools that can integrate with enterprise software tools, when appropriate. Enterprise-wide access brings:

  • a centralized software to create and manage OT device communication rules
  • real-time network information about devices, switches, and bandwidth usage
  • seamless integration with business and other security applications

Veracity: the ICS network solution for security and scale

From legacy devices to new projects, the Veracity OT Network Controller makes future-proofing your OT network easier than ever. Using a consolidated network management tool reduces the time it takes to troubleshoot, maintain, and manage the network –  all of which will reduce downtime, enabling: 

  • a deny by default posture for physically connected devices
  • automated networking processes so changes can be carried out faster and more accurately
  • maintenance of new and existing PLCs and devices without compromising the segmentation strategy

Integrate with the Enterprise

An API allows integration with enterprise software tools including MES, MOM, Work Order Management, and any custom system.  Net-Optix uses standard unmodified Ethernet and will work with any cyber security active monitoring tool you already have in place as part of a defense in depth strategy.

Switches

No more need to manage each switch individually, worrying about VLans, ACLs, or other frustrating networking paradigms.  With Net-Optix managing switches, simply buy an SDN enabled switch from your favorite vendor and our software takes care of the rest.

Speed

Operations that used to require reconfiguring a switch now are handled automatically.  Changes required in the network are now simple to implement.

Scalable

Group related devices into zones to easily manage your network at scale. Net-Optix is designed to work from 10 end points to 10,000 end points.

Our Value

Product Resources

Gain peace of mind with enterprise-grade solutions tailor-made to secure and scale Veracity Software across your entire organization.

Want to learn more? Download our white paper

Enter your email address and we will send you a link to the white paper.

Security

Switches will not pass any communication without first assuring with Net-Optix that it is allowed.   No more open ports for bad actors to access.   Lock down even the oldest PLCs and other devices without expensive upgrades.

Automation

North bound API allows programmatic integration with business and other security applications. 

Reliability

Central network management allows for any network topology.  Even supports a mesh network of switches for the ultimate speed and resilience.

Frequently Asked Questions

SDN or Software Defined Networking is an open standard that allows the programmatic management of network traffic.   It is very commonly used in cloud applications and distributed networking by the major players in those industries.

Deny by Default means that no network communication traffic is allowed through switches unless explicitly defined as acceptable by the system.

A Zero Trust Network Architecture requires that no device on the network can be trusted by default.   Typical networks will allow network communication if you are within the same subnet.   Net-Optix will not allow any network communication traffic that is not explicitly authorized by the system no matter where you plug in the device.

Net-Optix requires a Linux computer that runs as the network controller and network switches that support SDN.  We recommend Dynics and SEL switches, but many others support SDN.

We recommend having one of our authorized integration partners install Net-Optix for you.  Please see our partners page to find the best one for you.

How do you think about your plant floor operations? Most people do not think of it in terms of network segregation.  Most people think of wanting this PLC to communicate with that HMI.  This is how Net-Optix presents your network to you.  This allows the people who maintain the operations to also manage the network.

Yes you can.  With learn mode, the system can watch existing network traffic to create the rules required within the system getting you up and running very quickly.   Net-Optix does require SDN switches and if your current system does not support, SDN, we will work with you on the best and most cost effective implementation.

Like most security solutions, Net-Optix is a software-as-a-service subscription solution.   Pricing is based on the size of your network and which options a required for your unique installation.   Please contact us for more information.

IT Support by SADOSSecure, Fast Hosting for WordPress

Access White Paper

Enter your email address to access the white paper