by Petra | Aug 30, 2023 | Use Case
The need to connect IT and OT has grown with the digitalisation of production processes. Buthow do you secure this information flow and avoid exposing your systems to cyberattacks? Secure information flow in an IT/OT environment It has become increasingly important to...
by Petra | Aug 29, 2023 | White paper
What you will learn from this White Paper Surveillance (camera) networks always have high security requirements and are more often than not closed off from any outside connections. This lowers the risk of outside interference, but also presents some substantial...
by Petra | Aug 29, 2023 | White paper
What you will learn from this White paper The American department Homeland Security has published the guide “Seven Steps to Effectively Defend Industrial Control Systems”, advising on how to avoid cyber attacks on critical infrastructure. The list of...
by Petra | Aug 29, 2023 | White paper
What you will learn from this White paper Network segmentation limits the damage of a cyberattack. Without it, there is a risk that sensitive information can leak or be manipulated, and that malware and ransomware can spread uncontrollably and quickly. In this White...
by Petra | Aug 29, 2023 | White paper
What you will learn from this White Paper In this White Paper, we will discuss situations where a technology other than firewalls should be considered. When is a firewall not enough? How do you enhance your network security level? What is a Cross Domain Solution?...