W&T connects
Interfaces for TCP/IP, Ethernet, RS-232, RS-485, USB, 20mA, glass and plastic fiber optic cable, http, SNMP, OPC, Modbus TCP, I/O digital, I/O analog, ISA, PCI
Product overview:

IT security for machines, devices and systems

Network segmentation/isolating

The requirements for IT security are continually increasing in industry. Yet at the same time we often see a lack of personnel resources for implementing this security. The IT security products from W&T are designed for straightforward implementation of concrete security requirements. As a basic measure for many IT security concepts the W&T micro-firewalls isolate critical systems (older devices, IoT systems, etc.) on a secure island in your network. The Microwall Bridge provides security when needed, quickly and simply, while the Microwall VPN and IO provide additional protection.

  • Security enhancement without modifying the IP setup:

    The Microwall Bridge segments sensitive network areas without changing the IP configuration of the components which have been isolated. The preferred area of application is therefore the easiest possible, add-on security expansion of existing infrastructures.

  • Firewall router incl. VPN access:

    The Microwall VPN, essentially a firewall router, enables secure access to maintenance islands in the customer network, Opens VPN tunnels between two network locations and adds cryptographic and authenticated access possibilities to your secure island.

  • Firewall router incl. VPN access and switch:

    The Microwall IO includes all the functions of the Microwall VPN. Use the digital in- and outputs to switch remote maintenance and firewall-specific actions in automatoin and process environments. Using a PLC output, a simple button or switch etc. VPN access, certain firewall rules or the status of the network interfaces can be controlled.

  • Network one-way street:

    The Fixed Defined Firewall enables read-only access to your network data traffic to provide analysis with no undesirable side-effects, for example in the contexts of Big Data and anomaly monitoring.