GuardianSuccess StoriesSuccess Story: Inventory and Continuous Monitoring at Adhex Tech Tapes26 Nov at 9:44 amquestion_answer0One of the biggest success stories of our company has been the deployment of InprOTech Guardian for the asset inventory…
TechpapersForensic Analysis in OT Environments19 Nov at 9:41 amquestion_answer0In an increasingly connected world, OT networks face constantly evolving cyber threats. When an incident occurs, understanding what happened, how,…
EventsThe Inprosec Group, Strategic Sponsor at the V Encontro Ciber.gal 202510 Nov at 11:10 amquestion_answer0Between November 5 and 7, 2025, the Inprosec Group actively participated in the V Encontro Ciber.gal, Galicia’s flagship cybersecurity event,…
Events19ENISE Summary20 Oct at 10:10 amquestion_answer0Last week, from October 14th to 16th, the Inprosec Group once again participated as an exhibitor at ENISE, which this…
TechpapersMQTT in OT Environments: Efficient Communication and Emerging Threats7 Oct at 9:19 amquestion_answer0In an increasingly connected industrial world, MQTT (Message Queuing Telemetry Transport) has become one of the leading protocols for communication…
UncategorizedLoRa and LoRaWAN in Industrial Environments: Long-Range Connectivity with Cybersecurity Challenges17 Sep at 3:12 pmquestion_answer0The deployment of long-range, low-power wireless technologies, such as LoRa and LoRaWAN, has revolutionized the way data is collected and…
TechpapersPorts & Adapters (Hexagonal Architecture)28 Aug at 7:31 amquestion_answer0In its evolution throughout its history, software development and the different schools of architecture with traction in the community have…
TechpapersSCADA in OT environments: visibility and protection for critical infrastructures.19 Aug at 7:51 amquestion_answer0The SCADA systems (Supervisory Control and Data Acquisition) allow real-time monitoring and control of distributed industrial processes. They are crucial…
TechpapersImportance of OT cybersecurity awareness and training1 Aug at 9:35 amquestion_answer0In recent years, cyber security attacks targeting OT environments have increased dramatically. What once seemed an isolated terrain for digital…
GuardianStrategic ConsultingTechpapersHow to Scan an OT Network and Monitor Industrial Protocols23 Jul at 10:20 amquestion_answer0Due to the complexity of the Operational Technology (OT) environment and the frequent lack of documentation about the network’s status,…