Editor's Choice


How to protect your industrial network

I&C February 2026 Editor's Choice Fieldbus & Industrial Networking

Network security is no longer a matter of preventing hacking or data breaches; operational stability and productivity now depend on it. For OT networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin guarded uptime and resilient defence (GUARD).

Redefining OT security

Traditional network security primarily focuses on perimeter defence such as firewalls, intrusion detection systems and anomaly monitoring. These defence mechanisms, essential for perimeter protection, may not fully address internal threats or device-level vulnerabilities alone.

Let’s take a small to medium-sized water treatment plant responsible for providing clean water to a municipality as an example. Because downtime affects public health, it must be avoided at all costs. The plant is subject to regulatory compliance requirements that require

robust cybersecurity measures, and a network security solution that guarantees continuous operation and meets the stringent compliance standards. However, there are limited resources for incident response and recovery, and personnel are mostly concerned with ensuring that the water treatment continues to operate.

For this scenario, the concept of GUARD is a perfect fit. GUARD distinguishes itself by going beyond network boundary protection. It embeds security within every network node while ensuring seamless integration with existing OT devices. This inherent resilience enables the plant to recover by itself and maintain operations with minimal disruption, even during cyber attacks.

There are three core strategies:

Guarded uptime: For industrial networks, uptime equals productivity and revenue. Significant losses result from any network downtime. Hence, the quick recovery of critical network devices from attacks or failures is paramount. Power redundancy, network redundancy protocols and fast configuration restoration are crucial in minimising production disruption.

Resilience from within: Built-in intrinsic defence, unlike traditional add-on security architectures, embeds security into devices so that network infrastructure achieves security by design. This includes:

• IEC 62443-4-1 certified secure development life-cycle (SDL) ensuring products adhere to the highest security standards, from design to operation.

• IEC 62443-4-2 Security Level 2 hardened devices (covering everything from routers to Ethernet switches) with built-in multilayer network segmentation (Layer 2, Layer 3, and VLAN) to block lateral movement of internal threats.

Collaboration and futureproofing: GUARD focuses on safeguarding existing networks while integrating new devices and technologies.

• Every proprietary network redundancy innovation is compatible with standardised technologies.

• A network management system supports third-party device monitoring and management, enhancing overall network visibility and operational efficiency.

• A vast partner system provides global and local support.

Key questions to ask when assessing your needs

Intrinsic vs add-on security

• Is your goal to protect the entire network, not just its boundaries?

• Do you want to strengthen your network without the added complexity of external security overlays?

A ‘yes’ to both questions means you must look for intrinsic security. This is built directly into the network devices − routers, switches and serial device servers. This security-by-design approach, certified through IEC 62443-4-1, strengthens your network from the inside out, making it more resilient to attacks. Think of it as building a fortress instead of just hiring guards.

Uptime and resilience focus

• What are the biggest challenges you face in maintaining the reliability and security of your industrial network?

• What is your current network redundancy strategy?

Although threat detection is vital, prioritising guarded uptime and quick recovery is key. Network redundancy protocols, rapid configuration recovery and secure device design work together to minimise the impact of any security event on your operations. To avoid revenue loss from downtime, focus on maintaining smoothly operating systems. Use the network topology to help resolve any network issues.

Seamless integration and operational efficiency

• Do you have a mix of legacy and modern equipment on your network?

• How do you handle patching and vulnerability management for your industrial devices?

Seamless integration of network security with your existing infrastructure and future technologies is essential.

Broader compatibility with existing network redundancy protocols and network management supporting third-party device monitoring provides enhanced visibility and control across your entire industrial network. It’s crucial to find a solution that enhances your operations without replacing your current investments.

New value through innovation

GUARD is more than just another security solution, it represents a new mindset of ‘intrinsic resilience’. It breaks away from traditional ‘perimeter-only’ protection frameworks by embedding security into every network node and tightly integrating uptime with resilient defense to achieve seamless operational continuity. To address the rising complexity and importance of IIoT and OT networks, Moxa seeks to strengthen industrial network security and operational stability, aiming to become a leading industry reference for network architecture.

For more information contact RJ Connect, +27 11 781 0777, sales@rjconnect.co.za, www.rjconnect.co.za


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Reinventing grain silo management
VEGA Controls SA Editor's Choice
The VEGAPULS 6X radar sensor is designed for continuous level measurement to help overcome the challenges faced by storage in grain silos.

Read more...
Trends in humanoid robots
Editor's Choice
Humanoid robots are increasingly viewed less as futuristic prototypes and more as a practical route to bring artificial intelligence into human-designed environments.

Read more...
Four futures for AI: The choices we need to make now
Editor's Choice IT in Manufacturing
AI is everywhere and its implications are now structural. The question is no longer whether AI will matter, but what kind of society it will shape.

Read more...
Modular control platform for the hydrogen industry
Beckhoff Automation Editor's Choice Electrical Power & Protection
With a seamless modular control solution from Beckhoff featuring over 500 data points and numerous ELX series terminals with intrinsically safe interfaces, Greenlight Innovation is breaking new ground in hydrogen testing.

Read more...
Loop signature Part 2-3: Feedforward Control: Part 2
Michael Brown Control Engineering Editor's Choice Fieldbus & Industrial Networking
Feedforward control tuning is not nearly as critical as feedback tuning, and fairly simple models are usually fine for the purpose in hand.

Read more...
Proactive treatment of industrial boiler water
Editor's Choice
As water treatment is a critical aspect of industrial boiler management and potentially one of the greatest operational risk points, AES relies on close partnerships with third-party industrial water treatment specialists. These act as important safety nets.

Read more...
Giant super atoms unlock a toolbox for quantum computers
Editor's Choice IT in Manufacturing
In the pursuit of powerful and stable quantum computers, researchers at Chalmers University of Technology, Sweden have developed the theory for an entirely new quantum system based on the novel concept of giant super atoms.

Read more...
Siemens sets out Africa’s mining future
Siemens South Africa Editor's Choice News
The Mining Indaba in Cape Town brought industry leaders together to explore how the sector can unlock long-term value. Sabine Dall’Omo, CEO of Siemens sub-Saharan Africa, joined the conversation.

Read more...
Cybersecure, futureproof and resilient connectivity in mining and manufacturing
RJ Connect Editor's Choice IT in Manufacturing
Digital transformation is no longer a strategic ambition in mining and manufacturing, it is operational reality. The result is unprecedented efficiency and visibility, but also heightened cybersecurity risk.

Read more...
Understanding Festo Automation Experience
Festo South Africa Editor's Choice
Festo’s automation portfolio delivers solutions that help manufacturers increase productivity, flexibility and reliability while reducing lifecycle costs. Central to this portfolio is Festo Automation Experience, a unified automation platform that combines modern control technology and industrial intelligence to meet the needs of today’s smart production systems.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved