Solutions

Our solutions have been deployed on over 15GW of power plants, making Operant one of the leading providers of networking and cybersecurity to the U.S. power generation market.

To understand how we can help you implement a secure-by-design approach connect with us:

OPN Connect™

Secure-by-Design software layer

It’s common to think of connections as point-to-point, but in the real world they seldom are.

Data traverses multiple VPNs, servers, and firewalls as it moves from the field to an operations center. Likewise, most security tools were developed for securing point-to-point infrastructure and network perimeters.

Thus, cyber solutions end up stitched together between handoffs requiring an intricate coordination of data decryption/re-encryption, ongoing configurations, and key management in a best-effort attempt to prevent breaches. The end result is often an entangled assortment of solutions with marginal effectiveness.

Resilient

Allows for multi-path communications without the need for complex fail-over controls as found in costly SD-WAN solutions. When packets pass across redundant links:  ‘fastest packet wins’ ensures both resiliency and lowest latency.

Secure

Each data packet is signed, encrypted, and authenticated. Allowing for each transaction to be verified before being processed. Thwarting attempts by malicious actors who may have gotten past perimeter defenses.

Segment

All communications are encrypted and kept private and only visible to trusted parties, certificates derive from a verified root of trust. Assisting with IT/OT/IoT convergence. Even across public wireless and cloud networks.

Flexible

Can connect over ‘any link that can pass bit’. Additionally, can act as an overlay on existing networking infrastructure, making it easy to deploy on both greenfield and when dealing with complex legacy brownfield systems.

Multi-Party Trust

Simplifying secure remote access between people, systems, and machines.

It’s a common problem in Operational Technology (OT) networks: How do you give users the access they need easily to assets in the field, without giving them more access than they should have, and for longer than they should have it?

Multi-Party Trust (MPT) uses a trust console to deploy user-defined policies out to assets in the field and to connects stakeholders while ensuring secure data segmentation.

Governance

MPT enables administrators’ assignment of roles to users and attributes to equipment through identity management services such as Active Directory. Once assigned, these can be synchronized to local Active Directories, allowing secure access when connectivity is lost.

Muliple Stakeholders

Complex roles can be per job function across organizational departments, or even between organizations such as facility owners, third party contractors, or OEMs.

Can implment inteneral RBAC, ABAC and even PBAC company policies

Fine-Grained

Attributes can be per specified site with access restricted down to individual pieces of equipment on-site such as SCADA servers, PLCs, weather stations, historians etc. Access is time- bounded for one-off access or restricted to particular maintenance windows on a periodic basis.

Want to know more?

Get in touch and we'll get back to you as soon as we can.  We look forward to hearing from you!