This seamless combination of solutions for OT environments
protects your ciritical systems from evolving security threats.
The occurrence of security threats through the connection between OT and IT network
An outdated operating system, patch
Frequent use of file-sharing/remote access programs
Use of OT protocols vulnerable to security
Limitations in applying IT network security techniques to OT networks
Advanced malware/ransomware targeting specific ICS
Lack of security technologies based on OT protocol analysis
Inadequate network visibility and monitoring management
A lack of investment in security threat detection and management
The absence of systematic and integrated security compliance
Security requirements that take into account the internal environment of the OT network must be fulfilled. The availability of facilities must be guaranteed, and the analysis of various OT protocols must support visibility, data transmission, and security threat detection.
asset and network identification & Monitoring
data diode for secure data transmission
malicious code & anomalies
vulnerabilities
network separation &
network perimeter security
function, address, value analysis
unauthorized IP
function code control
NAONWORKS and AhnLab offer OT security optimized for various customer environments
depending on security strategies per level of identification, detection, and response.
Endpoint assets/process identification
Malicious code inspection / Unauthorized process detection
Whitelist control/Media control
Non-resident malicious code inspection/removal
Unauthorized traffic detection
Unauthorized traffic blocking