{"id":43052,"date":"2025-03-10T17:09:00","date_gmt":"2025-03-10T21:09:00","guid":{"rendered":"https:\/\/netfoundry.io\/?page_id=43052"},"modified":"2025-03-30T18:21:37","modified_gmt":"2025-03-30T22:21:37","slug":"securing-critical-infrastructure","status":"publish","type":"page","link":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/","title":{"rendered":"Securing Critical Infrastructure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"43052\" class=\"elementor elementor-43052\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7afb54c e-flex e-con-boxed e-con e-parent\" data-id=\"7afb54c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e40c3e e-con-full e-flex e-con e-child\" data-id=\"6e40c3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d6bd351 e-grid e-con-full e-con e-child\" data-id=\"d6bd351\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a95dd7c e-con-full hero-c0 e-grid e-con e-child\" data-id=\"a95dd7c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ed72ee jet-breadcrumbs-align-mobile_extra-center elementor-widget elementor-widget-jet-breadcrumbs\" data-id=\"0ed72ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-breadcrumbs jet-blocks\">\n\t\t<div class=\"jet-breadcrumbs\">\n\t\t<div class=\"jet-breadcrumbs__content\">\n\t\t<div class=\"jet-breadcrumbs__wrap\"><div class=\"jet-breadcrumbs__item\"><a href=\"https:\/\/netfoundry.io\/\" class=\"jet-breadcrumbs__item-link is-home\" rel=\"home\" title=\"NetFoundry, Developers of OpenZiti\">NetFoundry, Developers of OpenZiti<\/a><\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a6033d elementor-widget-mobile_extra__width-initial elementor-widget elementor-widget-heading\" data-id=\"4a6033d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Securing Critical Infrastructure<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b94a0ff e-con-full e-flex e-con e-child\" data-id=\"b94a0ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75f7cb0 elementor-align-left elementor-widget__width-inherit elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"75f7cb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#learn-more\" id=\"learn-more\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95fbc8b elementor-align-left elementor-widget__width-inherit elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"95fbc8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/netfoundry.io\/lets-talk\/\" id=\"learn-more\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Schedule a meeting<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63c0c90 e-con-full hero-c1 elementor-hidden-mobile elementor-hidden-mobile_extra e-grid e-con e-child\" data-id=\"63c0c90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b339f1 e-transform elementor-invisible elementor-widget elementor-widget-image\" data-id=\"7b339f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;_transform_flipX_effect&quot;:&quot;transform&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1536\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-33250\" alt=\"NetFoundry | IT Admin &amp; SecOps\" srcset=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04.jpg 1536w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04-300x300.jpg 300w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04-1024x1024.jpg 1024w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04-150x150.jpg 150w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04-768x768.jpg 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-285c8e8 e-grid e-con-full e-con e-child\" data-id=\"285c8e8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7a25c28 e-con-full e-flex e-con e-child\" data-id=\"7a25c28\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fab2e15 elementor-widget elementor-widget-text-editor\" data-id=\"fab2e15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Security for Power &amp; Energy Solutions<\/h3><h4><em>\u00a0Are You Ready?<\/em><\/h4><p>Today\u2019s energy infrastructure is more reliant than ever on connectivity and solutions driving automation and reducing risk. Secure and unhackable energy distribution systems are paramount to ensuring the world can \u201ckeep the lights on\u201d. Robust protection of critical infrastructure is mandatory, not an option!<\/p><ul><li>Electric utilities must comply with the evolving NERC cybersecurity requirements<\/li><li>Upcoming revisions to NERC\u2019s CIP-003 standard, particularly CIP-003-9, will become effective on April 1, 2026.<\/li><\/ul><div>\u00a0<\/div><p>These revisions introduce enhanced zero trust controls, focusing on:<\/p><ol><li>Improving authentication for remote users<\/li><li>Securing communication with assets containing low-impact Bulk Electric System (BES) Cyber Systems<\/li><li>Improving visibility into OT systems.<\/li><\/ol><p>Furthermore, CIP-003-10 and CIP-003-11 propose even more rigorous zero trust requirements, including stronger identity management and authentication protocols. These revisions underscore the need of zero trust principles in securing utility networks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69a06bd e-con-full e-flex e-con e-child\" data-id=\"69a06bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b84c465 elementor-invisible elementor-widget elementor-widget-jet-table\" data-id=\"b84c465\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"jet-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-table jet-elements\">\n\t\t<div class=\"jet-table-wrapper\">\n\t\t\t<table class=\"jet-table jet-table--fa5-compat\">\n\t\t\t\t<thead class=\"jet-table__head\"><tr class=\"jet-table__head-row\"><th class=\"jet-table__cell elementor-repeater-item-ec5f124 jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">CIP-003-9\/10\/11<\/div><\/div><\/div><\/th><th class=\"jet-table__cell elementor-repeater-item-43aceea jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">NetFoundry Zero Trust Solution<\/div><\/div><\/div><\/th><\/tr><\/thead>\n\t\t\t\t\t\t\t\t<tbody class=\"jet-table__body\"><tr class=\"jet-table__body-row elementor-repeater-item-3af66f0\"><td class=\"jet-table__cell elementor-repeater-item-8d36cbc jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R1: Cyber Security Policies &#038; Security Control<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-9d4822e jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Scalable, programmable connectivity<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-078159d\"><td class=\"jet-table__cell elementor-repeater-item-526948c jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R2: Electronic Access Controls (Least Privilege &#038; SRA)<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-0401923 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Least Privilege, E2E encryption<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-ba3d2f1\"><td class=\"jet-table__cell elementor-repeater-item-e9928b0 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R2: Vendor Electronic Remote Access<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-d3f8d35 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Built-in PKI, AuthZ, AuthN, micro-segmentation<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-18bbb3c\"><td class=\"jet-table__cell elementor-repeater-item-b0fb7e0 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R2: Secure Transient Cyber Assets &#038; Removable Media<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-e8b9537 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Strong Identities and Posture Checks\n<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-2cdee92\"><td class=\"jet-table__cell elementor-repeater-item-23cd786 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R2: Incident Response &#038; Logging<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-0360c87 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Comprehensive events, metrics<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-364f07d\"><td class=\"jet-table__cell elementor-repeater-item-e997c91 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R2: Physical Security &#038; MFA Integration<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-8b47c90 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">mTLS and MFA<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-1ea4d1c\"><td class=\"jet-table__cell elementor-repeater-item-0c86e68 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R2: Threat Monitoring &#038; Malicious Traffic Detection<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-d767398 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Least Privilege Access and continuous AuthN<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-51891b1\"><td class=\"jet-table__cell elementor-repeater-item-3a59ec2 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R2: Encryption of Authentication Data in Transit<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-66370f6 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">mTLS and Chacha20\/Poly1305<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-47cf723\"><td class=\"jet-table__cell elementor-repeater-item-2bf7121 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R3: Delegation &#038; Compliance Reporting<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-9e00b9e jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">RBAC, APIs and detailed logging<\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-0216bd6\"><td class=\"jet-table__cell elementor-repeater-item-c1815eb jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>R4: Documented Policy Implementation &#038; Enforcement<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-ea49fa5 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Ease of use drive compliance<\/div><\/div><\/div><\/td><\/tr><\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d42ec6 e-grid e-con-full e-con e-child\" data-id=\"8d42ec6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-717774d elementor-widget elementor-widget-image\" data-id=\"717774d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"408\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/03\/NetFoundry-fabric-overlay-1024x522.jpg\" class=\"attachment-large size-large wp-image-43037\" alt=\"\" srcset=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/03\/NetFoundry-fabric-overlay-1024x522.jpg 1024w, https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/03\/NetFoundry-fabric-overlay-300x153.jpg 300w, https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/03\/NetFoundry-fabric-overlay-768x392.jpg 768w, https:\/\/netfoundry.io\/wp-content\/uploads\/2025\/03\/NetFoundry-fabric-overlay.jpg 1302w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2a0ccb elementor-widget elementor-widget-text-editor\" data-id=\"a2a0ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>NetFoundry\u2019s Zero Trust Platform <\/b><span style=\"font-weight: 400;\">offers a comprehensive, easy-to-deploy solution that enables electric utilities to enhance security, simplify compliance, and improve operational efficiency by embedding zero trust connectivity directly into existing applications, devices, and edge compute systems, enabling product makers to rapidly enhance the security of their offerings with minimal disruption. Here\u2019s how NetFoundry can address the most critical challenges faced by utilities in achieving compliance and securing their OT and IT environments<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcf7f28 e-grid e-con-full e-con e-child\" data-id=\"bcf7f28\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06d3c7c elementor-widget elementor-widget-image\" data-id=\"06d3c7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-cta-royal-blue.svg\" class=\"attachment-large size-large wp-image-36700\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b511021 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b511021\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b6ef39 elementor-widget elementor-widget-image\" data-id=\"7b6ef39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-cta-royal-blue.svg\" class=\"attachment-large size-large wp-image-36700\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<main class=\"elementor-element elementor-element-c28592e e-con-full e-flex e-con e-child\" data-id=\"c28592e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-63ead3b e-grid e-con-full e-con e-child\" data-id=\"63ead3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-439fbbc elementor-widget elementor-widget-heading\" data-id=\"439fbbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Embedded Solution for Product Makers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/main>\n\t\t<div class=\"elementor-element elementor-element-00e1d4d e-con-full e-flex e-con e-child\" data-id=\"00e1d4d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d92cdbe e-grid e-con-full e-con e-child\" data-id=\"d92cdbe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8f7806 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"e8f7806\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/products\/zero-trust-your-way\/\" class=\"elementor-icon\" tabindex=\"-1\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-cloud-meatball\"><\/i>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNetFoundry\u2019s Zero Trust Platform can be easily embedded into existing applications, devices, and edge compute environments, empowering product manufacturers to quickly integrate zero trust connectivity into their solutions. Whether you are developing IoT devices, edge computing systems, or industrial control systems, NetFoundry provides a seamless, secure framework that ensures your products meet compliance standards while offering robust protection against evolving cyber threats. With NetFoundry, you can accelerate product development timelines, improve security, and simplify the deployment of secure, compliant solutions to your customers.\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bec8e1 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"3bec8e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/products\/zero-trust-your-way\/\" class=\"elementor-icon\" tabindex=\"-1\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-hand-receiving\"><\/i>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNetFoundry\u2019s Zero Trust Platform is purpose-built to enable comprehensive connectivity use cases of the electric utilities while adhering to the stringent cybersecurity and regulatory requirements. By embedding zero trust principles into devices and applications, NetFoundry enables granular access control, secure remote connections, network segmentation, and comprehensive audibality. This makes it easier for utilities to comply with NERC\u2019s latest requirements while reducing risk and enhancing overall security posture.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f0b5a0 elementor-invisible elementor-widget elementor-widget-jet-table\" data-id=\"4f0b5a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"jet-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-table jet-elements\">\n\t\t<div class=\"jet-table-wrapper\">\n\t\t\t<table class=\"jet-table jet-table--fa5-compat\">\n\t\t\t\t<thead class=\"jet-table__head\"><tr class=\"jet-table__head-row\"><th class=\"jet-table__cell elementor-repeater-item-d32f804 jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Use Cases<\/div><\/div><\/div><\/th><th class=\"jet-table__cell elementor-repeater-item-dc73e10 jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Old Game &#8211; VPNs<\/div><\/div><\/div><\/th><th class=\"jet-table__cell elementor-repeater-item-30af436 jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">New Game &#8211; NetFoundry<\/div><\/div><\/div><\/th><\/tr><\/thead>\n\t\t\t\t\t\t\t\t<tbody class=\"jet-table__body\"><tr class=\"jet-table__body-row elementor-repeater-item-3af66f0\"><td class=\"jet-table__cell elementor-repeater-item-8d36cbc jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Connectivity and Security<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-9d4822e jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Persistent VPN tunnels with open inbound ports; flat network structure increases risk of lateral movement<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-b04e885 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Zero Trust, Least Privilege, micro segmented, and no inbound ports &#8211; dramatically reducing the attack surface<\/strong><\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-078159d\"><td class=\"jet-table__cell elementor-repeater-item-526948c jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Ease of Use and Scale<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-0401923 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Complexity\/cost grow linearly with each site; maintain and expose IP addresses and device passwords<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-e9d6591 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Deployment and management with intuitive orchestration platform, scaling effortlessly as the network grows<\/strong><\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-ba3d2f1\"><td class=\"jet-table__cell elementor-repeater-item-e9928b0 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Secure Remote Access to OT Assets<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-d3f8d35 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Multiple logins (VPN, jump server, etc.), fragmented user\/role control at each<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-4c37661 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Frictionless user access with permissions managed once at the hub<\/strong><\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-18bbb3c\"><td class=\"jet-table__cell elementor-repeater-item-b0fb7e0 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Centralized Access Control<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-e8b9537 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Highly fragmented duplicate, repetitive provisioning at each sub-station. Hard to scale and error prone<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-8dda48e jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Centralized, consistent, micro-segmented access control policies across your deployment. \nIntegrate with corp IDP\n<\/strong><\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-2cdee92\"><td class=\"jet-table__cell elementor-repeater-item-23cd786 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Compliance &#038; Auditing<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-0360c87 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Risk of NERC\/CIP non-compliance; \ndecentralized logs and limited correlation make auditing difficult\n<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-862c3c8 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Zero Trust connectivity with centralized auditing enables compliance with NERC-CIP, NIST, CRA, IEC62443 etc.<\/strong><\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-364f07d\"><td class=\"jet-table__cell elementor-repeater-item-e997c91 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Micro-Segmentation<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-8b47c90 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Not supported in VPNs. Additional advanced bolt-on tools required to micro-segment<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-444f7c9 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>All connectivity is micro-segmented by design. \nNo lateral movement possible\n<\/strong><\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-017abeb\"><td class=\"jet-table__cell elementor-repeater-item-93e2a36 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Hardware Requirements<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-65c4c80 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Dedicated VPN\/jump server appliance per site<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-5a927d3 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Software-based &#038; embedded into product \u2013 Use \nany available existing compute\n<\/strong><\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-88f4a91\"><td class=\"jet-table__cell elementor-repeater-item-5351835 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Routing &#038; Performance<\/strong><\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-b03ac55 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Often forced hairpin or single path<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-e4cee5f jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\"><strong>Smart Routing improves performance and resilience<\/strong><\/div><\/div><\/div><\/td><\/tr><\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2344e11 e-con-full e-flex e-con e-child\" data-id=\"2344e11\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-586bcb3 e-grid e-con-full e-con e-child\" data-id=\"586bcb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6632623 e-con-full e-flex e-con e-child\" data-id=\"6632623\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1ff5a04 e-con-full e-flex e-con e-child\" data-id=\"1ff5a04\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b284e2 elementor-widget elementor-widget-heading\" data-id=\"6b284e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/\">Unparalleled Security<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9a5bfb elementor-widget elementor-widget-text-editor\" data-id=\"a9a5bfb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For product makers, NetFoundry offers a streamlined solution to enhance the security of your applications, devices, and edge compute solutions. By integrating NetFoundry\u2019s platform, you can provide<br \/>your customers with enhanced security features and help them achieve regulatory compliance with minimal effort.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b945c0f elementor-absolute elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"b945c0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fal fa-lock\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2169306 e-con-full e-flex e-con e-child\" data-id=\"2169306\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-46b9979 e-con-full e-flex e-con e-child\" data-id=\"46b9979\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c209a73 elementor-widget elementor-widget-heading\" data-id=\"c209a73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/netfoundry.io\/products\/zero-trust-your-way\/\">Questions?<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-678205c elementor-widget elementor-widget-text-editor\" data-id=\"678205c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To learn more about how NetFoundry can help your organization secure its critical infrastructure and simplify compliance with the latest CIP standards, reach out directly to our sales team at<br \/>sales@netfoundry.io.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd1f40b elementor-absolute elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"fd1f40b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/netfoundry.io\/products\/zero-trust-your-way\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fal fa-cloud-meatball\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80dbf24 e-flex e-con-boxed e-con e-parent\" data-id=\"80dbf24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NetFoundry Securing Critical Infrastructure Learn More Schedule a meeting Security for Power &amp; Energy Solutions \u00a0Are You Ready? Today\u2019s energy infrastructure is more reliant than ever on connectivity and solutions driving automation and reducing risk. Secure and unhackable energy distribution systems are paramount to ensuring the world can \u201ckeep the lights on\u201d. Robust protection of [&hellip;]<\/p>\n","protected":false},"author":103,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-43052","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Critical Infrastructure - NetFoundry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/securing-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Critical Infrastructure\" \/>\n<meta property=\"og:description\" content=\"NetFoundry Securing Critical Infrastructure Learn More Schedule a meeting Security for Power &amp; Energy Solutions \u00a0Are You Ready? Today\u2019s energy infrastructure is more reliant than ever on connectivity and solutions driving automation and reducing risk. Secure and unhackable energy distribution systems are paramount to ensuring the world can \u201ckeep the lights on\u201d. Robust protection of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/securing-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-30T22:21:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/\",\"name\":\"Securing Critical Infrastructure - NetFoundry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-it-admins-and-secops-04.jpg\",\"datePublished\":\"2025-03-10T21:09:00+00:00\",\"dateModified\":\"2025-03-30T22:21:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-it-admins-and-secops-04.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-it-admins-and-secops-04.jpg\",\"width\":1536,\"height\":1536,\"caption\":\"NetFoundry | IT Admin & SecOps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/securing-critical-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Critical Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Critical Infrastructure - NetFoundry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Securing Critical Infrastructure","og_description":"NetFoundry Securing Critical Infrastructure Learn More Schedule a meeting Security for Power &amp; Energy Solutions \u00a0Are You Ready? Today\u2019s energy infrastructure is more reliant than ever on connectivity and solutions driving automation and reducing risk. Secure and unhackable energy distribution systems are paramount to ensuring the world can \u201ckeep the lights on\u201d. Robust protection of [&hellip;]","og_url":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_modified_time":"2025-03-30T22:21:37+00:00","og_image":[{"width":1536,"height":1536,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@netfoundry","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/","url":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/","name":"Securing Critical Infrastructure - NetFoundry","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04.jpg","datePublished":"2025-03-10T21:09:00+00:00","dateModified":"2025-03-30T22:21:37+00:00","breadcrumb":{"@id":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/securing-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-it-admins-and-secops-04.jpg","width":1536,"height":1536,"caption":"NetFoundry | IT Admin & SecOps"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/securing-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Securing Critical Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/pages\/43052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=43052"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/pages\/43052\/revisions"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=43052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}