The security of your transportation infrastructure starts with your network.

In order to protect your network from hacks, data breaches, information theft and other malicious attacks, you need a multi-layered approach:

User Profiles 

  • Consistent network access control through universal network profile (UNP) at both wired and wireless interfaces
  • Private VLAN protects user privacy
  • Enforced role-based access and quarantine process for unauthorized or non compliant users

Securing IoT traffic and devices is a challenge that can't be solved by any single piece of software or burst of creative thinking. It requires a strategic approach.

Heitor Faroni, Director of Network Solutions Marketing, ALE

Icon for Other Industries

Device Fingerprinting  

  • Device fingerprinting understands which devices are connected
  • Automated device onboarding with 802.1x authentication
  • Device health check ensures compliance before allowing access
  • Isolates infected devices and limits access to remediation servers

 Application Visibility

  • Deep Packet Inspection (DPI) technology, identifies applications traversing the network in real time
  • Application enforcement blocks the use of insecure and undesirable applications
  • Firewall (Palo Alto Integration) enables more granular firewall rules based on user and device information
  • IDS and Quarantine Manager
Icon for Service Provider Industries
Icon for MarCom Resources 1

Smart Analytics

  • Devices and application visibility helps protect your transportation system
  • Top-use reports and predictive analysis provide traffic anomaly alerts, identification of potential attacks

OS Hardening

  • Multiple embedded operating system techniques mitigate or prevent attacks, including flood control gates, port scanning
    detection, task CPU usage monitor and control, etc.
  • Always-on DOS filtering prevents cyber attacks
  • Extra-hardened operating system with innovative CodeGuardian technology
Icon for License Key Resources 1
Icon for Product Services Industries 1

IoT Containment

  • VLAN, SPB, VXLAN allows segmentation of virtual networks
  • Network access control, application visibility and enforcement, along with profile-driven policies, enable remote management, monitoring and safeguarding of all loT devices
  • IoT containment combines virtualization, security and QoS to provide optimal operation for loT systems while minimizing security risks
Documents