As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.
Share

Ensuring Uptime and Resilient Defense: How GUARD Protects Industrial Networks

Laurent Liou     Apr 15, 2025
You can manage and share your saved list in My Moxa
Teaser Image
Share
You can manage and share your saved list in My Moxa

In the rapidly evolving Industrial Internet of Things (IIoT) and smart manufacturing landscape, network security is no longer just about preventing hacking or data breaches. Operational stability and productivity now depend on it. For operational technology (OT) networks, resilient defense and consistent uptime are crucial. They are the core tenets that underpin Guarded Uptime and Resilient Defense (GUARD).

Redefining OT Security: From Perimeter Defense to Intrinsic Resilience

Traditional network security primarily focuses on perimeter defense, such as firewalls, intrusion detection systems (IDSs), and anomaly monitoring. These defense mechanisms, essential for perimeter protection, alone may not fully address internal threats or device-level vulnerabilities.

Let’s take a small to medium-sized water treatment plant responsible for providing clean water to a municipality as an example. Because downtime here affects public health, it must be avoided at all costs. The plant is subject to regulatory compliance requirements that mandate robust cybersecurity measures, requiring a network security solution that guarantees continuous operation and meets the stringent compliance standards. But they have limited resources for incident response and recovery. And they are mostly concerned with ensuring that the water cleaning continues to operate.

For this scenario, the concept of GUARD is a perfect fit. GUARD distinguishes itself by going beyond network boundary protection: it embeds security within every network node while ensuring seamless integration with existing OT devices. This inherent resilience design enables applications like the water treatment plant to recover by itself and maintain operations with minimal disruption, even during cyberattacks.

Three Core Strategies

  • Guarded uptime—For industrial networks, uptime equals productivity and revenue. Significant losses result from any network downtime. Hence, the quick recovery of critical network devices from attacks or failures is paramount. Power redundancy, network redundancy protocols (STP, RSTP, MRP, Turbo Ring, Turbo Chain), and fast configuration restoration are crucial in minimizing production disruption.
  • Resilience from within—Built-in intrinsic defense, unlike traditional add-on security architectures, embeds security into devices so that network infrastructure achieves security by design. This includes:
    • IEC 62443-4-1 certified secure development life-cycle (SDL), ensuring products adhere to the highest security standards, from design to operation
    • IEC 62443-4-2 Security Level 2 hardened devices (covering everything from routers to Ethernet switches) with built-in multilayer network segmentation (Layer 2, Layer 3, VLAN) to block lateral movement of internal threats.
  • Collaboration and futureproofing—GUARD focuses on safeguarding existing networks while integrating new devices and technologies.
    • Every proprietary network redundancy innovation (e.g., Turbo Ring or Turbo Chain) is compatible with standardized technologies (MRP, STP/RSTP)
    • A network management system (NMS) supports third-party device monitoring and management, enhancing overall network visibility and operational efficiency.
    • A vast partner ecosystem provides global and local support to meet the needs of different markets and industries.

Key Questions to Ask When Assessing Your Needs

  • Intrinsic vs. Add-on Security: 
    • Is your goal to protect the entire network, not just its boundaries?
    • Do you want to strengthen your network without the added complexity of external security overlays?
      • A “yes” to both questions means you must look for intrinsic security. As the name suggests, the security is built directly into the network devices—routers, switches, and serial device servers. This security-by-design approach, certified through IEC 62443-4-1, strengthens your network from the inside out, making it more resilient to attacks. Think of it as building a fortress instead of just hiring guards.
  • Uptime and Resilience Focus: 
    • What are the biggest challenges you face in maintaining the reliability and security of your industrial network?
    • What is your current network redundancy strategy?
      • Although threat detection is vital, prioritizing guarded uptime and quick recovery is key. Network redundancy protocols, rapid configuration recovery, and secure device design work together to minimize the impact of any security event on your operations. To avoid revenue loss from downtime, focus on maintaining smoothly operating systems. Use the network topology to help resolve the network issues, if there are any.
  • Seamless Integration and Operational Efficiency: 
    • Do you have a mix of legacy and modern equipment on your network?
    • How do you handle patching and vulnerability management for your industrial devices?
      • Seamless integration of network security with your existing infrastructure and future technologies is essential. Broader compatibility with existing network redundancy protocols and network management supporting third-party device monitoring provides enhanced visibility and control across your entire industrial network. It’s crucial to find a solution that enhances your operations without replacing your current investments.

New Value Through Innovation: The Perfect Combination of Resilience and Stability

GUARD is more than just another security solution— it represents a new mindset of “intrinsic resilience.” It breaks away from traditional perimeter-only protection frameworks by embedding security into every network node and tightly integrating uptime with resilient defense to achieve seamless operational continuity. To address the rising complexity and importance of IIoT and OT networks, Moxa seeks to strengthen industrial network security and operational stability, aiming to become a leading industry reference for network architecture. Visit our microsite to know more about how to strengthen your business resilience by enhancing your industrial network security.

More Articles

Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback