Der Blätterkatalog benötigt Javascript.
Bitte aktivieren Sie Javascript in Ihren Browser-Einstellungen.
The Blätterkatalog requires Javascript.
Please activate Javascript in your browser settings.
How Stellar 3 2 Redefines Threat Detection Stellar 3 2 by TXOne Networks sets new standards in OT security In this interview discover how machine learning behavioral analysis and enhanced asset monitoring improve threat detection reduce false alarms and ensure system stability Can you share the specific technical improvements in version 3 2 that enhance the visibility of device health? In version 3 2 we have integrated Stellar machine learning with network visibi lity This allows us to provide comprehensive asset beha vioral insights by combining endpoint behaviors with net work activities This holistic approach ensures a deeper understanding of device health and security How does Stellar‘s behavioral analysis differ from traditional IT EDR solutions? Traditional IT EDR solutions collect activity telemetry and perform data correlation to identify suspicious activities However they lack OT context awareness which can result in numerous false alarms At TXOne Networks we believe OT devices exhibit unique beha viors or „fingerprints “ that can be modeled Stellar CPSDR leve rages behavior monitoring rules to detect suspicious activities while applying device baselines to minimize noise and reduce false alarms This ensures more accurate threat detection without overwhelming security teams How does the new vulnerable asset monitoring interface help security teams respond to threats more effectively? The newly designed interface for monitoring potentially com promised assets provides a clear view of associated activities and event trends This helps securi ty teams evaluate the damage scope effectively All informa tion is assetcentric meaning it is gathered based on specific CPS assets Additionally the „Situational Awareness“ page provides a comprehensive overview of detected risks relative to esta blished baselines This serves as a centralized hub for analyzing device activities and assessing operational disruption probabi lities allowing for faster more targeted incident responses How does Stellar ensure system resiliency in OT environments especially compared to traditional IT EDR solutions? Availability is the top priority in OT environments so we must balance system resource usage with security Stellar optimizes resource allocation to meet Freitag 4 April 2025 Messe aktuell | 19 www industrialproduction de SMART SOFTWARE SMART FACTORY HALLE 15 Stand F28 these needs leading to great customer success Moreover Stellar recognizes over 40 000 OT applications and certificates to maintain critical workflows The system will never restart without the asset owner‘s confirmation allowing them to schedule updates at the most appropriate time This prevents unnecessary opera tional disruptions Stellar also provides re mote asset management for security teams while allowing OT operators to take over when necessary This enables full customization of security measures to suit both centra lized and decentralized environ ments With nearly 40 000 OT applications identified how does Stellar ensure this database remains uptodate and continues to capture new applications? We have a dedicated team responsible for continuously updating our database Additio nally we work closely with our customers to obtain realtime updates from their field envi ronments This collaborative approach ensures that our da tabase remains comprehensive and uptodate allowing us to provide the highest level of OT security ag Hall 16 Booth B10 TXOne Networks www txone com Dr Terence Liu CEO TXOne Networks Image TXOne Networks