TXOne Networks - Experts & Thought Leaders

Latest TXOne Networks news & announcements

TXOne Networks: Advanced OT security solutions

TXOne Networks, a pioneer in Cyber-Physical Systems (CPS) security, introduced asset-vulnerability management and other expanded capabilities for its Edge network security solution.  The new release of TXOne Edge creates an end-to-end solution for helping ensure the reliability, safety and availability of industrial processes and infrastructure, enabling organisations to maximise their return on investment in operational technology (OT) security. TXOne Networks will showcase its Edge network security solution in Booth Q5730 at SEMICON Taiwan 2025, scheduled for September 10-12 in Taipei.  Threat detection and response “When we founded TXOne, every product was designed to protect the full lifecycle of critical equipment,” said Dr. Terence Liu, Founder and CEO of TXOne Networks. “After five years of large-scale field validation, TXOne Edge now marks a major milestone—extending backward into risk identification and forward into threat detection and response, becoming a true one-stop solution for enterprise OT network security.” OT-native security solution TXOne Edge is an OT-native security solution purpose-built to unify visibility, protection, detection and response—empowering organisations to achieve long-term operational resilience. Enterprises gain end-to-end vulnerability lifecycle protection, as the TXOne Networks solution delivers industry best features combining proactive prevention with intelligent detection to safeguard industrial operations at every stage: Holistic OT network visibility, enabling instant situational awareness and uncovering hidden risks in shadow OT environments Effective asset management, providing legacy support and full asset visibility for optimised operations Risk-based asset vulnerability, detection identifying and prioritising vulnerabilities, quantifying risk and providing actionable remediation guidance to reduce the attack surface Adaptive network segmentation, containing lateral movement, blocking worm propagation and protecting mission-critical assets AI-powered segmentation defence, combining adaptive controls with automated rule learning to minimise risk, contain intrusions and secure critical OT environments Continuous detection and monitoring, enabling real-time detection and long-term cyber resilience to protect against evolving attacks Unifying architecture With TXOne Networks’ all-in-one, unifying architecture, organisations reduce total cost of ownership and simplify deployment, compared to purchasing and maintaining multiple disjointed tools. The integrated TXOne Edge suite of security appliances, firewall and management console already is proven for enhancing network resilience and adaptability across a wide range of industrial sectors. It was specifically designed for the complexities of OT networks, where traditional informational technology (IT) cybersecurity solutions fall short. TXOne Edge empowers organisations to complete their entire OT security journey in one step, with a unified OT-native networking solution built for resilience and growth.

TXOne SageOne OT security platform enhancements

TXOne Networks, a pioneer in Cyber-Physical Systems (CPS) security, announced an expanded new version of its SageOne OT Cybersecurity Governance Platform. Already relied upon by many industrial leaders across sectors with exacting cybersecurity requirements, TXOne SageOne has been enhanced to deliver a novel capability for intelligent vulnerability mitigation. How to patch effectively under time constraints One of the most common challenges faced by (operational technology) OT cybersecurity practitioners is how to patch effectively under time constraints—making risk-based prioritisation essential. TXOne SageOne uniquely integrates external intelligence on emerging threats, the specific operational context of each manufacturer and industry-standard vulnerability scoring to provide meaningful, tailored guidance to the organisation’s security team. Three-phase approach to risk management The TXOne Networks solution implements a rigorous, three-phase approach to risk-based vulnerability management: Assess—TXOne SageOne pulls deep, OS-level vulnerability and configuration data—augmented by real-time threat intelligence—to build an accurate, context-rich view of every CPS asset’s true risk exposure. Prioritise—Asset criticality, observed attack patterns and existing defenses are fused into TXOne Networks’ proprietary Vulnerability Situational Awareness Rating (VSAR) risk score to distill thousands of potential flaws to the few that truly demand attention. Remediate—TXOne SageOne automatically interprets each asset’s context (device type, operational status, and business impact) and prescribes the optimal mitigation path (full patching, virtual patching, or just-in-time guided micro-segmentation) without disrupting production. Other protective measures CPS consists of mission-critical assets and sophisticated computation, and shutting down a production line CPS consists of mission-critical assets and sophisticated computation, and shutting down a production line to implement a patch on such a system or to undertake other protective measures in the OT network generally is not an option.  Conventional cybersecurity management platforms rely on vulnerability scoring that is predicated on concepts and protocols borrowed from information technology (IT). That information is useful in OT cybersecurity—but impractical if relied upon alone. Conventional systems Conventional systems often indicate thousands of high-priority vulnerabilities across a large-scale manufacturing environment. A security team tasked with securing OT often is no more than 10 people, so the practical reality is the majority of alerts generated by the conventional systems go unaddressed. OT threat landscape Armed with a holistic, dependable overview of the truly urgent threats to its corporate environment TXOne SageOne, however, narrows guidance to a manageable number of legitimately critical vulnerabilities that demand immediate action across a given manufacturer’s OT threat landscape. Armed with a holistic, dependable overview of the truly urgent threats to its corporate environment, the security team is positioned to immediately take concrete, meaningful steps to protect people, OT assets and processes. Intelligent vulnerability mitigation capabilities “TXOne SageOne represents a breakthrough in OT security governance, having been conceived and purpose-built from the ground up to address the unique cybersecurity needs of OT networks and systems—not IT,” said Dr. Terence Liu, CEO of TXOne Networks. “The latest release introduces intelligent vulnerability mitigation capabilities that underscore this differentiation, empowering security teams with tools tailored to the specific nature of OT environments and delivering actionable insights that lead to achievable, impactful outcomes.” SageOne platform All of TXOne Networks’ industry-pioneering point products for CPS security are centrally controlled via the SageOne platform—Stellar for endpoint protection, Element for security inspection and Edge for network defense. As the central hub for all TXOne Networks security offerings, SageOne brings Element, Stellar, and Edge into seamless collaboration to deliver unified visibility, centralised control and optimised vulnerability management. TXOne SageOne provides a comprehensive, detailed and easy-to-understand visualisation of the precise security posture of operations at any given moment.

TXOne Stellar 3.2: Enhancing OT security solutions

TXOne Networks, a pioneer in Cyber-Physical Systems (CPS) security, announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection and response in operational technology (OT) environments. Stellar simplifies the journey into threat hunting and detection while overcoming the limitations of traditional information technology (IT) endpoint detection and response (EDR) solutions, which can disrupt OT operations and productivity. Purpose-built for OT environments, Stellar ensures effective security without compromising system stability. Security incident investigations Stellar ensures effective security without compromising system stability “We have observed that alert fatigue, which is common to EDR solutions, can be even more severe in OT security, with security teams feeling overwhelmed by warnings due to the lack of contextual information about OT devices,” said Dr. Terence Liu, Chief Executive Officer (CEO) of TXOne Networks. “For example, when automated scripts use outdated login credentials that should have been corrected long ago, EDR solutions may flag them as anomaly events. This is why having contextual awareness of OT devices is crucial. The new Version 3.2 of our Stellar product will enhance visibility into a device’s state and make it easier to filter out harmless anomalies, ensuring that security incident investigations become more efficient.” Potentially compromised assets Stellar's comprehensive asset-context capabilities help organisations make informed security choices: Situational awareness—The TXOne Networks solution provides a centralised place for examining a device's activities while assessing the likelihood of operational disruption through Stellar's behavioral analysis. Enhanced asset baseline generation—Network behaviour is integrated into Stellar machine learning, offering comprehensive asset behavioural data. This will reduce guesswork when security teams investigate anomalies or enforce security. Impact risk snapshot—A new interface for monitoring potentially compromised assets shows associated activities and event trends to evaluate the damage scope. Endpoint protection solution Stellar is a specialised endpoint protection solution designed for industrial control systems (ICS) and other OT devices. It identifies nearly 40,000 OT applications and incorporates TXOne Networks’ Cyber-Physical System Detection and Response (CPSDR) technology, which can protect both legacy and modern Windows systems from cyberattacks and unauthorised system modifications.