SlideShare a Scribd company logo
1 of 4
Download to read offline
INDUSTRIAL
Many enterprises are faced with the challenge to effectively manage data-
communication to their remote sites. Keeping them operational 24x7 requires
assured connectivity and enhanced security. For this purpose Fox IT has developed
Fox Industrial SkyTale, a reliable high-grade connectivity solution, providing
excellent performance even in the most demanding environments. The solution
is easy to manage and guarantees availability through multiple channels, without
compromising confidentiality and integrity.
Industrial SkyTale
Reliable remote communication enabler; provides assured connectivity,
enhanced security, easy data-communication management
Reliable remote
communication enabler
Assured connectivity
Whenitcomestonetworksandcommunicationchannels,
all have their pros and cons. Radio communications
can work, but require direct line-of-sight or suffer from
fluctuating atmospheric conditions. Packet loss is typical
for any aerial link. A satellite uplink has reasonable band-
width, but suffers from latency due to the enormous
distances data has to travel.
Whatever the preferred channel of choice, most compa-
nies with remote sites or logistics companies currently
secure their data transfer by means of a VPN tunnel.
However, this introduces a new single point of failure.
Once the VPN connection is interrupted, communication
with all remote sites or fleet vehicles is cut off. Bearing
that in mind, deploying a VPN is considered network-
intrusive and thus time-consuming.
Fox Industrial SkyTale is a fault-absorbing, self-optimizing
multi-channel communication infrastructure. A solution
that automatically searches for and finds the optimal and
most stable network connection, be it through radio,
satellite or telephone.
Enhanced security
As remote locations are usually equipped with sub­
standard communication facilities, companies effec-
tively jeopardize the security of their flow of data.
Interconnections between an Industrial Control System
(ICS), telephone, internet, and corporate networks
are vulnerable to eavesdropping and manipulation.
Satellite traffic can easily be listened in on by anyone in
possession of a satellite receiver. Likewise, radio trans-
missions can also easily be overheard by anyone with a
radio antenna operating in the vicinity of the transmitter.
In addition, companies should realize that the cyber
threat landscape is continuously maturing. Meaning
that governments are intensifying their efforts to regu-
late critical infrastructures. As a result, companies are
increasingly confronted with government regulations
and compliancy thereof.
Fox Industrial SkyTale protects all data by applying the
industry’s most advanced encryption standards available,
on every channel. As a result, offering complete protec-
tion against malicious hacker activities or other man in
the middle attacks. A granular permission model allows
precise control over authorizations. Providing a company
the ability to properly manage communications access.
Manageability of remote sites be it on land or sea, or keeping tabs
on moving entities is a real challenge to most companies. Of course
Information Technology and connectivity have paved the way for
a more efficient operation. However, communications with most data
systems have often proven to be unreliable or intermittent at best.
Equally worrying is their lack of security.
Easy management
Fox Industrial SkyTale comes with a management system
for administration and configuration. Especially designed
to provide flexibility and can be used both in on-line and
off-line scenarios. In an off-line scenario, settings and key
material are transferred to a device on physical carriers,
e.g. secure USB sticks. In addition, Fox Industrial SkyTale
supports re-keying over the network and Over the Air
Rekeying (OTAR). This is a robust system that delivers
management and keying material just in time. Finally,
the solution can be deactivated remotely (zeroisation).
Fox-IT provides a standard integration and programming
interface to control Fox Industrial SkyTale, for example
connection to an onboard computer of a vehicle’s internal
network. This smart solution facilitates flexible data con-
nectivity management, is easy to implement and requires
no special IT-knowledge or changes to the network
infrastructure.
Fox Industrial SkyTale offers the best of both
worlds. The solution enhances network conti­nuity
and state-of-the-art security at the same time.
Fox Industrial SkyTale encompasses a hardware
and soft-ware module that optimally supports
communication between objects and persons;
data, voice and camera feeds.
WiFi
Wireless
INDUSTRIAL
100-011-EN
fox-it
•	 Was founded in 1999.
•	 Established one of the first Cyber Security
Operations Centers in Europe.
•	 Is Europe’s largest specialized cyber security
company.
•	 Operates in three business areas:
1	 Cyber Threat Management: a solution portfolio
aimed at reducing the risks of cyber threats,
and includes: professional services, managed
security services, and technology;
2	 Web and Mobile event analytics: a solution
portfolio that is aimed at reducing financial
risks in (online) payment transactions;
3	 High Assurance: solutions that make trusted
communication possible to the highest
classification levels.
•	 Has been involved in many high-profile Incident
Response cases. Most of the cases we worked on
are secret. An approved selection can be shared
upon request.
Areas of Deployment
•	 Offshore and Onshore Oil & Gas industry.
•	 Power & Energy industry.
•	 Transportation & Logistics industry (secured fleet management).
•	 Shipping industry.
•	Defense.
•	 Government Public Works Department (PWD) (i.e. bridges, locks and floodgates).
•	 Ministries of Foreign Affairs (communication with embassies).
Advantages Fox Industrial SkyTale for:
Operations Technology (OT)
•	 High availability.
•	 Optimized in order to support unstable and low-bandwidth networks.
•	 Supports industrial protocols.
Information Technology (IT)
•	 Transparent for IP communications.
•	 State-of-the-art encryption technology, protecting:
–	 Integrity of network streams;
–	 Confidentiality of network streams.
•	 Supports Multicast, SNMP, TFTP, Syslog, NTP, DHCP.
•	Supports IPv4 and IPv6.
•	 Management, online and offline, is easy and user-friendly through
a standard system.
•	 Flexible integration with existing systems.
•	 High throughput of up to 100MBit/s.
•	 Minimal, configurable packet overhead.
•	 Plug & Play functionality and easy to configure and operate.
fox-it
Olof Palmestraat 6, Delft
po box 638, 2600 ap Delft
The Netherlands
t +31 (0) 15 284 79 99
f +31 (0) 15 284 79 90
e fox@fox-it.com
www.fox-it.com

More Related Content

What's hot

Apresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no BrasilApresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no BrasilTI Safe
 
Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...
Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...
Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...NetworkCollaborators
 
Secure it mobile_comms
Secure it mobile_commsSecure it mobile_comms
Secure it mobile_commswangqiang6100
 
Iot - Technology and Market Overview
Iot - Technology and Market OverviewIot - Technology and Market Overview
Iot - Technology and Market OverviewNewton Licciardi
 
industrial IoT can monitor critical machinery
industrial IoT can monitor critical machineryindustrial IoT can monitor critical machinery
industrial IoT can monitor critical machineryDan Yarmoluk
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
LoRa by KPN - brochure
LoRa by KPN - brochureLoRa by KPN - brochure
LoRa by KPN - brochureKPN IoT
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Mohamed Tharwat Waheed
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G securityRanjitUpadhyay4
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingDavid Livingston J
 
TOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBED
TOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBEDTOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBED
TOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBEDijngnjournal
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructureStuart Bennett
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergenceAhmed Banafa
 

What's hot (19)

12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a
 
Apresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no BrasilApresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no Brasil
 
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro RizziEENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
 
Unizen LORA Flyer
Unizen LORA FlyerUnizen LORA Flyer
Unizen LORA Flyer
 
Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...
Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...
Cisco Connect 2018 Thailand - Secured and visualized data center connectivity...
 
Secure it mobile_comms
Secure it mobile_commsSecure it mobile_comms
Secure it mobile_comms
 
Iot - Technology and Market Overview
Iot - Technology and Market OverviewIot - Technology and Market Overview
Iot - Technology and Market Overview
 
industrial IoT can monitor critical machinery
industrial IoT can monitor critical machineryindustrial IoT can monitor critical machinery
industrial IoT can monitor critical machinery
 
ESS-Brochure
ESS-BrochureESS-Brochure
ESS-Brochure
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
LoRa by KPN - brochure
LoRa by KPN - brochureLoRa by KPN - brochure
LoRa by KPN - brochure
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
 
IOT Networks
IOT NetworksIOT Networks
IOT Networks
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
TOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBED
TOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBEDTOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBED
TOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBED
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 

Viewers also liked

Viewers also liked (9)

Teorías del aprendizaje
Teorías del aprendizaje  Teorías del aprendizaje
Teorías del aprendizaje
 
Moda 2013
Moda 2013Moda 2013
Moda 2013
 
Collague_Banda
Collague_BandaCollague_Banda
Collague_Banda
 
Diabetes
DiabetesDiabetes
Diabetes
 
Depoimento de Dilma à comissão do Impeachment
Depoimento de Dilma à comissão do ImpeachmentDepoimento de Dilma à comissão do Impeachment
Depoimento de Dilma à comissão do Impeachment
 
Catalogo easylink ita eng 2013
Catalogo easylink ita eng 2013Catalogo easylink ita eng 2013
Catalogo easylink ita eng 2013
 
CJ爆轟パラメータの計算 / computaion of detonation parameters.
CJ爆轟パラメータの計算 / computaion of detonation parameters.CJ爆轟パラメータの計算 / computaion of detonation parameters.
CJ爆轟パラメータの計算 / computaion of detonation parameters.
 
Administracion de medicamentos
Administracion de medicamentosAdministracion de medicamentos
Administracion de medicamentos
 
Bloque 3
Bloque 3Bloque 3
Bloque 3
 

Similar to Fox-Industrial-Skytale-EN

How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...Sun Telecom
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
RagingWire Case Study - Flextronics
RagingWire Case Study - FlextronicsRagingWire Case Study - Flextronics
RagingWire Case Study - FlextronicsRobert Lindsay
 
Disaster Recovery and Humanitarian Networks
Disaster Recovery and Humanitarian NetworksDisaster Recovery and Humanitarian Networks
Disaster Recovery and Humanitarian NetworksST Engineering iDirect
 
teltonika-networks-use-case-catalog-v1.2.pdf
teltonika-networks-use-case-catalog-v1.2.pdfteltonika-networks-use-case-catalog-v1.2.pdf
teltonika-networks-use-case-catalog-v1.2.pdfitsamihaland
 
The Telco journey to cloud
The Telco journey to cloudThe Telco journey to cloud
The Telco journey to cloudBSP Media Group
 
Digital Satellites Profile (2)
Digital Satellites Profile (2)Digital Satellites Profile (2)
Digital Satellites Profile (2)Digital Satellites
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid Software
 
Government and Defense Fixed Communications
Government and Defense Fixed CommunicationsGovernment and Defense Fixed Communications
Government and Defense Fixed CommunicationsST Engineering iDirect
 
Air Traffic Control Application Brief (2)
Air Traffic Control Application Brief (2)Air Traffic Control Application Brief (2)
Air Traffic Control Application Brief (2)Hernan Rodriguez
 
Satellite Content Distribution: Efficient, Reliable, Flexible, Controllable
Satellite Content Distribution: Efficient, Reliable, Flexible, ControllableSatellite Content Distribution: Efficient, Reliable, Flexible, Controllable
Satellite Content Distribution: Efficient, Reliable, Flexible, ControllableST Engineering iDirect
 
Industrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsIndustrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsAssim Magid
 
presentation-2022.pptx
presentation-2022.pptxpresentation-2022.pptx
presentation-2022.pptxAhmedSharshar6
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 

Similar to Fox-Industrial-Skytale-EN (20)

How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Talkbox® (1)
Talkbox® (1)Talkbox® (1)
Talkbox® (1)
 
WIMAX Technology
WIMAX TechnologyWIMAX Technology
WIMAX Technology
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
RagingWire Case Study - Flextronics
RagingWire Case Study - FlextronicsRagingWire Case Study - Flextronics
RagingWire Case Study - Flextronics
 
Disaster Recovery and Humanitarian Networks
Disaster Recovery and Humanitarian NetworksDisaster Recovery and Humanitarian Networks
Disaster Recovery and Humanitarian Networks
 
teltonika-networks-use-case-catalog-v1.2.pdf
teltonika-networks-use-case-catalog-v1.2.pdfteltonika-networks-use-case-catalog-v1.2.pdf
teltonika-networks-use-case-catalog-v1.2.pdf
 
The Telco journey to cloud
The Telco journey to cloudThe Telco journey to cloud
The Telco journey to cloud
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
Digital Satellites Profile (2)
Digital Satellites Profile (2)Digital Satellites Profile (2)
Digital Satellites Profile (2)
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20
 
Government and Defense Fixed Communications
Government and Defense Fixed CommunicationsGovernment and Defense Fixed Communications
Government and Defense Fixed Communications
 
Air Traffic Control Application Brief (2)
Air Traffic Control Application Brief (2)Air Traffic Control Application Brief (2)
Air Traffic Control Application Brief (2)
 
Satellite Content Distribution: Efficient, Reliable, Flexible, Controllable
Satellite Content Distribution: Efficient, Reliable, Flexible, ControllableSatellite Content Distribution: Efficient, Reliable, Flexible, Controllable
Satellite Content Distribution: Efficient, Reliable, Flexible, Controllable
 
Industrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsIndustrial Wireless Networking Solutions
Industrial Wireless Networking Solutions
 
presentation-2022.pptx
presentation-2022.pptxpresentation-2022.pptx
presentation-2022.pptx
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Keep your campus_connected
Keep your campus_connectedKeep your campus_connected
Keep your campus_connected
 

Fox-Industrial-Skytale-EN

  • 1. INDUSTRIAL Many enterprises are faced with the challenge to effectively manage data- communication to their remote sites. Keeping them operational 24x7 requires assured connectivity and enhanced security. For this purpose Fox IT has developed Fox Industrial SkyTale, a reliable high-grade connectivity solution, providing excellent performance even in the most demanding environments. The solution is easy to manage and guarantees availability through multiple channels, without compromising confidentiality and integrity. Industrial SkyTale Reliable remote communication enabler; provides assured connectivity, enhanced security, easy data-communication management
  • 2. Reliable remote communication enabler Assured connectivity Whenitcomestonetworksandcommunicationchannels, all have their pros and cons. Radio communications can work, but require direct line-of-sight or suffer from fluctuating atmospheric conditions. Packet loss is typical for any aerial link. A satellite uplink has reasonable band- width, but suffers from latency due to the enormous distances data has to travel. Whatever the preferred channel of choice, most compa- nies with remote sites or logistics companies currently secure their data transfer by means of a VPN tunnel. However, this introduces a new single point of failure. Once the VPN connection is interrupted, communication with all remote sites or fleet vehicles is cut off. Bearing that in mind, deploying a VPN is considered network- intrusive and thus time-consuming. Fox Industrial SkyTale is a fault-absorbing, self-optimizing multi-channel communication infrastructure. A solution that automatically searches for and finds the optimal and most stable network connection, be it through radio, satellite or telephone. Enhanced security As remote locations are usually equipped with sub­ standard communication facilities, companies effec- tively jeopardize the security of their flow of data. Interconnections between an Industrial Control System (ICS), telephone, internet, and corporate networks are vulnerable to eavesdropping and manipulation. Satellite traffic can easily be listened in on by anyone in possession of a satellite receiver. Likewise, radio trans- missions can also easily be overheard by anyone with a radio antenna operating in the vicinity of the transmitter. In addition, companies should realize that the cyber threat landscape is continuously maturing. Meaning that governments are intensifying their efforts to regu- late critical infrastructures. As a result, companies are increasingly confronted with government regulations and compliancy thereof. Fox Industrial SkyTale protects all data by applying the industry’s most advanced encryption standards available, on every channel. As a result, offering complete protec- tion against malicious hacker activities or other man in the middle attacks. A granular permission model allows precise control over authorizations. Providing a company the ability to properly manage communications access. Manageability of remote sites be it on land or sea, or keeping tabs on moving entities is a real challenge to most companies. Of course Information Technology and connectivity have paved the way for a more efficient operation. However, communications with most data systems have often proven to be unreliable or intermittent at best. Equally worrying is their lack of security.
  • 3. Easy management Fox Industrial SkyTale comes with a management system for administration and configuration. Especially designed to provide flexibility and can be used both in on-line and off-line scenarios. In an off-line scenario, settings and key material are transferred to a device on physical carriers, e.g. secure USB sticks. In addition, Fox Industrial SkyTale supports re-keying over the network and Over the Air Rekeying (OTAR). This is a robust system that delivers management and keying material just in time. Finally, the solution can be deactivated remotely (zeroisation). Fox-IT provides a standard integration and programming interface to control Fox Industrial SkyTale, for example connection to an onboard computer of a vehicle’s internal network. This smart solution facilitates flexible data con- nectivity management, is easy to implement and requires no special IT-knowledge or changes to the network infrastructure. Fox Industrial SkyTale offers the best of both worlds. The solution enhances network conti­nuity and state-of-the-art security at the same time. Fox Industrial SkyTale encompasses a hardware and soft-ware module that optimally supports communication between objects and persons; data, voice and camera feeds. WiFi Wireless INDUSTRIAL
  • 4. 100-011-EN fox-it • Was founded in 1999. • Established one of the first Cyber Security Operations Centers in Europe. • Is Europe’s largest specialized cyber security company. • Operates in three business areas: 1 Cyber Threat Management: a solution portfolio aimed at reducing the risks of cyber threats, and includes: professional services, managed security services, and technology; 2 Web and Mobile event analytics: a solution portfolio that is aimed at reducing financial risks in (online) payment transactions; 3 High Assurance: solutions that make trusted communication possible to the highest classification levels. • Has been involved in many high-profile Incident Response cases. Most of the cases we worked on are secret. An approved selection can be shared upon request. Areas of Deployment • Offshore and Onshore Oil & Gas industry. • Power & Energy industry. • Transportation & Logistics industry (secured fleet management). • Shipping industry. • Defense. • Government Public Works Department (PWD) (i.e. bridges, locks and floodgates). • Ministries of Foreign Affairs (communication with embassies). Advantages Fox Industrial SkyTale for: Operations Technology (OT) • High availability. • Optimized in order to support unstable and low-bandwidth networks. • Supports industrial protocols. Information Technology (IT) • Transparent for IP communications. • State-of-the-art encryption technology, protecting: – Integrity of network streams; – Confidentiality of network streams. • Supports Multicast, SNMP, TFTP, Syslog, NTP, DHCP. • Supports IPv4 and IPv6. • Management, online and offline, is easy and user-friendly through a standard system. • Flexible integration with existing systems. • High throughput of up to 100MBit/s. • Minimal, configurable packet overhead. • Plug & Play functionality and easy to configure and operate. fox-it Olof Palmestraat 6, Delft po box 638, 2600 ap Delft The Netherlands t +31 (0) 15 284 79 99 f +31 (0) 15 284 79 90 e fox@fox-it.com www.fox-it.com