Trend Micro extends cyber protection for large-scale industrial networks
The new addition will reduce the risks of malware infection and unauthorized access, among others

The convergence of operational technology (OT) and information technology (IT) in smart factories has led to massive advances in productivity. However, the same is not true in the case of security. The long-established tradition of deploying a flat and highly interconnected network architecture is making large-scale industries increasingly susceptible to cyber attacks.
Offering a solution to this problem, cyber security firm Trend Micro has announced EdgeIPS Pro, an intent-based industrial intelligent IPS array. The system, which Trend Micro claims is the first of its kind, has been designed specifically for industrial environments by TXOne Networks, a joint venture between Trend Micro and industrial networking solutions provider Moxa.
An extension of Trend Micro’s extensive smart factory security suite, EdgeIPS Pro aims to keep operating expenses low for large-scale industrial networks, through centralised management and simple deployment. For example, Trend Micro says that there is no need to change the network configuration of existing IT assets.
“As we face an ever-changing digital landscape, the successful convergence of IT and OT is now critical to business,” said Akihiko Omikawa, executive vice president of IoT security for Trend Micro and chairman of TXOne Networks. “Adding EdgeIPS Pro as an integral part of Trend Micro’s Smart Factory Security Solution is a milestone for protecting large-scale industrial networks on the shop floor. The IT-friendly deployment and management allows organizations to continue running operations while keeping serious threats at bay.”
EdgeIPS Pro also comes with TXOne’s one-pass Deep Packet Inspection (TXODPI) technology, which enables network segmentation for added security and efficient centralized management of large-scale industrial networks.
“The lack of network segmentation to stop malware propagation is the most common issue in the control network layer and a real challenge for ICS environments as they require deeper and wider industrial network protocol support,” said Dr. Terence Liu, General Manager for TXOne Networks. “EdgeIPS Pro allows administrators to organize network segmentation by business intention.”
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
"Thinly spread": Questions raised over UK government’s latest cyber funding scheme
The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag
By George Fitzmaurice Published
-
Modern enterprise cybersecurity
whitepaper Cultivating resilience with reduced detection and response times
By ITPro Published
-
IDC InfoBrief: How CIOs can achieve the promised benefits of sustainability
whitepaper CIOs are facing two conflicting strategic imperatives
By ITPro Published
-
The complete guide to the NIST cybersecurity framework
Whitepaper Find out how the NIST Cybersecurity framework is evolving
By ITPro Published
-
Are you prepared for the next attack? The state of application security in 2024
Webinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
By ITPro Published
-
The economics of penetration testing for web application security
whitepaper Get the most value from your security solution
By ITPro Published
-
How to extend zero trust to your cloud workloads
Whitepaper Implement zero trust-based security across your entire ecosystem
By ITPro Published
-
Four requirements for a zero trust branch
Whitepaper Effectively navigate the complex and ever-changing demands of security and network connectivity
By ITPro Published