{"id":41388,"date":"2026-04-13T23:17:16","date_gmt":"2026-04-13T23:17:16","guid":{"rendered":"https:\/\/ramsdata.com.pl\/certes-networks-and-cryptographic-segmentation-in-industrial-networks\/"},"modified":"2026-04-13T23:17:16","modified_gmt":"2026-04-13T23:17:16","slug":"certes-networks-and-cryptographic-segmentation-in-industrial-networks","status":"publish","type":"post","link":"https:\/\/ramsdata.com.pl\/en\/certes-networks-and-cryptographic-segmentation-in-industrial-networks\/","title":{"rendered":"Certes Networks and cryptographic segmentation in industrial networks"},"content":{"rendered":"<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Industrial networking (OT &#8211; Operational Technology) is one of the most challenging areas of cyber security. SCADA systems, PLCs, DCS systems and industrial IoT devices were designed for availability and determinism, not security. Many run on outdated protocols, don&#8217;t support encryption and can&#8217;t be updated without risking production downtime. Certes Networks offers an approach to protecting these environments that does not require modification or replacement of existing devices &#8211; cryptographic segmentation.   <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Table of contents<\/h3>\n<ol class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-decimal flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\">The specifics of industrial network (OT) security<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Why don&#8217;t traditional security approaches work in OT?<\/li>\n<li class=\"whitespace-normal break-words pl-2\">What is cryptographic segmentation?<\/li>\n<li class=\"whitespace-normal break-words pl-2\">How does Certes Networks implement cryptographic segmentation?<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Zero-Trust in OT environments with Certes<\/li>\n<li class=\"whitespace-normal break-words pl-2\">OT traffic visibility and monitoring<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Use cases &#8211; energy, manufacturing, critical infrastructure<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Key findings<\/li>\n<li class=\"whitespace-normal break-words pl-2\">FAQ<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Summary<\/li>\n<\/ol>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The specifics of industrial network (OT) security<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">OT networks differ fundamentally from IT networks in terms of security priorities. In IT, the priority is CIA (Confidentiality, Integrity, Availability) &#8211; with an emphasis on confidentiality. In OT, the priority is an inverted CIA &#8211; Availability is absolutely first, then Integrity, Confidentiality at the end. Production line downtime costs hundreds of thousands per hour &#8211; so any security action that can cause or risks downtime is rejected by OT operators.   <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Devices in OT networks are embedded systems often with operating systems from decades ago, without the ability to install security software, without manufacturer firmware updates, with communication protocols (Modbus, DNP3, Profibus, OPC) not designed with security in mind. IT\/OT convergence &#8211; the integration of office networks with production networks for Industry 4.0 purposes &#8211; dramatically increases the attack surface of industrial environments. <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/ramsdata.com.pl\/producenci\/certes-networks\/\">Certes Networks at Ramsdata offers<\/a> specialized encryption and segmentation solutions for enterprise and industrial environments. <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Why don&#8217;t traditional security approaches work in OT?<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">A firewall between the IT and OT network (the so-called industrial DMZ) is a good practice, but insufficient &#8211; it does not protect against lateral traffic inside the OT network, does not encrypt communication between devices, and does not solve the problem of unsafe protocols.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Installing security agents on OT devices is usually impossible &#8211; PLC or DCS controller does not support external software. Microsegmentation by VLAN is limited and does not provide encryption. Replacing OT devices with newer, security-enabled devices is prohibitively expensive and often impossible due to production continuity. Certes Networks offers an approach that circumvents these limitations &#8211; encryption and segmentation applied transparently, inline, without modifying OT devices.   <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">What is cryptographic segmentation?<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Cryptographic segmentation is an approach to isolating network segments by encrypting traffic between them, instead of through traditional network mechanisms (VLAN, firewall). Instead of asking &#8220;what is allowed between segments?&#8221;, cryptographic segmentation asks &#8220;who can read this traffic?&#8221;. Only devices belonging to the same cryptographic group can decrypt and read the messages &#8211; other devices see encrypted, unreadable traffic.  <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This model has key advantages for OT environments. Encryption is applied transparently &#8211; OT devices do not know that their communications are encrypted. No device or software modifications are required. Segmentation policies are defined centrally and applied by a dedicated Certes appliance, not by the OT devices themselves. Even if an attacker gains physical access to an OT network segment, he won&#8217;t be able to read communications between devices from other cryptographic groups.    <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">How does Certes Networks implement cryptographic segmentation?<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Certes Networks implements cryptographic segmentation through dedicated CryptoFlow Net Protector (CNP) devices installed inline in the OT network &#8211; without modifying the existing infrastructure. CNPs are transparent to network traffic: OT devices &#8220;do not know&#8221; of their existence and communicate normally. CNPs encrypt traffic based on policies defined centrally in the Certes management system (CipherTrust Manager or Certes CipherPoint).  <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Crypto Groups are logical segments between which traffic is allowed and encrypted. Devices assigned to the same group can communicate, devices from different groups &#8211; cannot, even if they are physically on the same network. Changing segmentation policies is done centrally and is immediately applied by all CNPs on the network &#8211; no downtime, no reconfiguration of OT devices.  <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Zero-Trust in OT environments with Certes<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Zero Trust in OT is not simply transferring the IT model to an industrial environment &#8211; it requires adaptation to the specifics, where unavailability of devices (for agents, updates) is the norm. Certes Networks implements Zero Trust principles through cryptographic segmentation without agents on protected devices. <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">&#8220;Never trust, always verify&#8221; translates in the Certes environment into: every connection between segments requires cryptographic authorization, devices can only communicate within authorized cryptographic groups, every unauthorized connection is automatically encrypted and unreadable, and all data flows are centrally logged. It&#8217;s Zero Trust adapted to the reality of OT &#8211; no agents, no device modification, no risk of downtime. For more on security solutions for industrial networks, visit <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/ramsdata.com.pl\/producenci\/certes-networks\/\">Ramsdata<\/a>.  <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">OT traffic visibility and monitoring<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">One of the biggest challenges in OT environments is the lack of visibility &#8211; you don&#8217;t know what devices exist on the network, what protocols they use, and what the normal communication patterns are. Certes Networks provides visibility without installing agents by passively analyzing network traffic. <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The Certes monitoring system identifies OT devices based on their network communications, maps data flows between devices and detects anomalies &#8211; unexpected connections, unknown protocols, unauthorized traffic between segments. This visibility is the foundation of an effective crypto segmentation policy &#8211; to define the right groups, you first need to understand who is communicating with whom on the OT network. <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Use cases &#8211; energy, manufacturing, critical infrastructure<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Energy and utilities is a sector where OT security is critical to public safety. SCADA systems controlling power distribution, water treatment plants or gas networks must be isolated from IT networks and external threats. Certes Networks is being deployed by critical infrastructure operators to segment power substations, substations and dispatch centers.  <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Industrial manufacturing requires segmentation between production lines (so that an attack on one line doesn&#8217;t spread to others), between OT and IT networks, and between environments of different vendors (when external service providers have access to the OT network). Certes cryptographic segmentation allows granular control of this access without reconfiguring the entire network. Transportation infrastructure (rail, aviation, ports) is another sector where Certes Networks is deployed to protect traffic control systems and critical infrastructure.  <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Key findings<\/h3>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\">OT networks have reversed security priorities over IT &#8211; availability comes absolutely first.<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Traditional security tools (agents, firewalls) do not work for OT devices, which cannot be modified.<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Certes cryptographic segmentation isolates segments by encrypting traffic, not by network mechanisms.<\/li>\n<li class=\"whitespace-normal break-words pl-2\">The deployment is transparent to OT devices &#8211; no modifications or downtime are required.<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Cryptographic groups define who can communicate with whom and exchange readable data.<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Certes provides OT network visibility without agents and Zero Trust without device modifications.<\/li>\n<\/ul>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">FAQ<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Does Certes cryptographic segmentation affect OT network latency?<\/strong>  Yes, but in a minimal way. Dedicated cryptographic chips in CNPs minimize additional latency-typically less than 1 ms, which is acceptable for most OT protocols. <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>How does Certes deal with OT protocols (Modbus, DNP3)?<\/strong>  Certes encrypts traffic transparently at the network level &#8211; it does not process the contents of OT protocols. Devices communicate normally via Modbus, DNP3, etc., and Certes CNP encrypts these transmissions without modifying them. <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Does Certes implementation require an OT network outage?<\/strong>  CNP inline deployment may require short maintenance outages (minutes) during physical installation. Subsequent changes to cryptographic policies are applied without downtime. <\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>How to manage cryptographic keys in Certes environment?<\/strong>  Certes CipherTrust Manager or Certes CipherPoint manage keys centrally. Keys are rotated automatically according to security policies, without interfering with OT devices. <\/p>\n<h3 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Summary<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Certes Networks&#8217; cryptographic segmentation is an approach to OT security that respects the realities of industrial environments &#8211; the need for availability, non-modifiability of devices and determinism of communications. Transparent inline deployment with no downtime, Zero Trust with no agents and full OT network visibility create a practical solution for sectors where other approaches fail. Contact <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/ramsdata.com.pl\/producenci\/certes-networks\/\">Certes Networks partner Ramsdata<\/a> to discuss implementing cryptographic segmentation in your industrial network.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Industrial networking (OT &#8211; Operational Technology) is one of the most challenging areas of cyber security. SCADA systems, PLCs, DCS systems and industrial IoT devices were designed for availability and determinism, not security. Many run on outdated protocols, don&#8217;t support encryption and can&#8217;t be updated without risking production downtime. Certes Networks offers an approach to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":40020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[56],"tags":[],"class_list":["post-41388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/posts\/41388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/comments?post=41388"}],"version-history":[{"count":0,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/posts\/41388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/media\/40020"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/media?parent=41388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/categories?post=41388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/tags?post=41388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}