U

How to use data diodes to secure your IT/OT integration

How to use data diodes to secure your IT/OT integration

Digitalisation drives demand for connecting IT and OT systems. This integration presents security challenges and requires specific solutions. In this blog post, we will provide you with a solution to how you can secure your integration with data diodes! Integrate IT...
Why it is important to work with security from the ground up

Why it is important to work with security from the ground up

Some may think that it is a very big project to start working with cybersecurity and therefore buy a simpler solution instead, with the hope that it will be enough. But that is not what reality looks like – at least not if you want to be secure for real. In order to...
Secure Unidirectional File Transfer

Secure Unidirectional File Transfer

A common need in a segmented network environment is to import and export files between different zones. File transfer and file sharing is done both between people and machines, using several different technologies depending on the environment. However, file transfer...
5 steps for network segmentation

5 steps for network segmentation

An important part of improving your cybersecurity is to work with network segmentation. Network segmentation in data networks means dividing a data network into subnetworks, where each is a network segment. The benefits of such splitting are mainly to improve security...
Securing Surveillance Network Communications

Securing Surveillance Network Communications

What you will learn from this White Paper Surveillance (camera) networks always have high security requirements and are more often than not closed off from any outside connections. This lowers the risk of outside interference, but also presents some substantial...