Product News: Stratus and Xage Security Fabric

Oct. 6, 2021
The offering promises to be a scalable and manageable zero-trust cybersecurity solution.

Stratus Technologies announced the validation of Xage Security Fabric on the Stratus ztC Edge computing platform following performance testing conducted by Xage Security. Xage is integrating the Stratus ztC Edge and Stratus ftServer computing platforms into its edge, enterprise, and cloud operations.

The combination of Xage Security Fabric with ztC Edge and ftServer creates highly available and scalable cybersecurity solutions for securing critical infrastructure and protecting operational data from the controller to the cloud without disrupting operations, the partners note. With Xage Security Fabric successfully running on Stratus computing platforms, operations benefit from comprehensive security easily deployed and managed by OT teams. This includes capabilities such as Universal Tamperproof Protection, Rogue Device Detection and Control, Remote-based Access Control (IAM/RBAC), and Dynamic Data Security. The combined Xage and Stratus solutions are ideal for oil & gas, chemicals, pharma, food & beverage, material handling, and any industry where data loss and downtime are unacceptable.

“Companies have been forced to rethink strategies for enabling secure remote collaboration and developing new opportunities for revenue in order to survive,” said Xage CEO Duncan Greatwood. “Edge computing is a critical foundation for effective cybersecurity in Industry 4.0 environments, and Xage and Stratus are meeting today’s challenges head-on. Together, we are assisting customers with digital transformation to better manage geographically-distributed and multi-party operations.”

Added Jason Andersen, Stratus vice president of business line management, “New, complex cybersecurity threats targeting industrial operations are putting greater strain on companies’ limited resources and staff already focused on modernization. Running Xage on ztC Edge enables teams to easily and reliably deploy a robust set of security capabilities across an operation, without the need for specialized skills, making for the perfect combination of zero-touch compute and zero-trust security.”