OPN Connect™
Secure-by-Design software layer
It’s common to think of connections as point-to-point, but in the real world they seldom are.
Data traverses multiple VPNs, servers, and firewalls as it moves from the field to an operations center. Likewise, most security tools were developed for securing point-to-point infrastructure and network perimeters.
Thus, cyber solutions end up stitched together between handoffs requiring an intricate coordination of data decryption/re-encryption, ongoing configurations, and key management in a best-effort attempt to prevent breaches. The end result is often an entangled assortment of solutions with marginal effectiveness.
Resilient
Allows for multi-path communications without the need for complex fail-over controls as found in costly SD-WAN solutions. When packets pass across redundant links: ‘fastest packet wins’ ensures both resiliency and lowest latency.
Secure
Each data packet is signed, encrypted, and authenticated. Allowing for each transaction to be verified before being processed. Thwarting attempts by malicious actors who may have gotten past perimeter defenses.
Segment
All communications are encrypted and kept private and only visible to trusted parties, certificates derive from a verified root of trust. Assisting with IT/OT/IoT convergence. Even across public wireless and cloud networks.
Flexible
Can connect over ‘any link that can pass bit’. Additionally, can act as an overlay on existing networking infrastructure, making it easy to deploy on both greenfield and when dealing with complex legacy brownfield systems.
Multi-Party Trust
Simplifying secure remote access between people, systems, and machines.
It’s a common problem in Operational Technology (OT) networks: How do you give users the access they need easily to assets in the field, without giving them more access than they should have, and for longer than they should have it?
Multi-Party Trust (MPT) uses a trust console to deploy user-defined policies out to assets in the field and to connects stakeholders while ensuring secure data segmentation.
Governance
MPT enables administrators’ assignment of roles to users and attributes to equipment through identity management services such as Active Directory. Once assigned, these can be synchronized to local Active Directories, allowing secure access when connectivity is lost.
Muliple Stakeholders
Complex roles can be per job function across organizational departments, or even between organizations such as facility owners, third party contractors, or OEMs.
Can implment inteneral RBAC, ABAC and even PBAC company policies
Fine-Grained
Attributes can be per specified site with access restricted down to individual pieces of equipment on-site such as SCADA servers, PLCs, weather stations, historians etc. Access is time- bounded for one-off access or restricted to particular maintenance windows on a periodic basis.
Want to know more?
Get in touch and we'll get back to you as soon as we can. We look forward to hearing from you!