Network Isolation2026-04-03T16:21:25+02:00
Loading...

Electronic Isolation for Lasting OT Cybersecurity

Permanently reduce the attack surface of your critical infrastructures and industrial environments with OT network segmentation through electronic isolation — a robust alternative to firewalls and network diodes.

Are these challenges familiar to you?

Meeting the growing IT/OT connectivity demands while preserving the security of operational networks.

Limiting exposure of critical systems, such as PLCs or SCADA, to ransomware and cyberattacks.

Complying with new regulatory requirements, such as NIS2, without disrupting existing infrastructure.

The solution is clear: strengthen protection through industrial network segmentation.

SEGMENT, YES, BUT…

In OT environments, every new security device deployed brings its own set of challenges, often hard to reconcile with on-the-ground requirements :
  • Additional maintenance operations
  • Changes to the existing technical architecture
  • Increased latency

Traditional segmentation solutions face significant limitations in addressing these constraints.

>> 2 to 10 security patches to apply per month for firewall-type technologies*

>> Data diodes handle certain OT protocols poorly. Their unidirectional nature limits usage unless additional gateways are added, which introduces latency.

*Seclab study based on the analysis of 5 OT firewall vendors

For Cybersecurity that Truly Respects OT-Specific Constraints

Seclab offers an innovative electronic-based physical isolation approach to segment OT networks with its Xchange appliance.

ELECTRONIC AIRGAP

Patented hardware technology providing a fully secure physical separation between two networks, while enabling safe data exchange.

ELECTRONIC PROTOCOL BREAK

  • Protection against zero-day attacks
  • Physical separation of environments
  • Immutable operation

UNIQUE PROCESS

Three processors, each with a dedicated security function, operating independently.

DOUBLE CONTROL

Two independent access controls, each enforcing half of the policy.

ELECTRONIC AIRGAP

Patented hardware technology providing a fully secure physical separation between two networks, while enabling safe data exchange.

ELECTRONIC PROTOCOL BREAK

  • Resistant to zero-day attacks
  • Physical separation of environments
  • Immutable operation

UNIQUE PROCESS

Three processors, each with a dedicated security function, operating independently.

DOUBLE CONTROL

Two independent access controls, each enforcing half of the policy.

Icône présentant un bras mécanique rendu invisible grâce à l'isolation électronique

Invisibility of Assets

A unique segmentation approach without any network-level connection, making protected assets completely invisible and inaccessible.

Lasting OT Confidence

Low maintenance effort thanks to minimal updates required. Hardware designed for longevity, with a 10-year MTBF.
Icône représentant le maintien de la cybersécurité dans le temps
Icône représentant un flux bidirectionnel, que les diodes réseaux gèrent mal

Alternative to Network Diodes

Secure uni- or bi-directional communications, supporting up to 800 Mbps throughput. No additional software components needed.

Compromise-Resilient Design

System integrity is guaranteed: even if one input is compromised, an attacker cannot cross to the other side.
Icône représentant une menace bloquée, pour évoquer une segmentation réseau OT résiliente
Icône représentant l'IT et l'OT réconciliés, pour évoquer l'administration zero-trust

Zero-Trust Administration

Access policies require validation by two independent controls. Each flow must be authorized on both the input and output sides. Administration of the two access controls is independent.

Trusted Solution

Sourcing, design, software routing, development, and assembly are all performed by Seclab in France. Electronic boards and chassis are manufactured in Europe.
Icône représentant un process industriel maîtrisé, pour évoquer une segmentation réseau OT souveraine

Key Use Cases for OT Network Segmentation with Electronic AirGap

To protect either the entire OT network or only the assets essential for the continuity of your operations (Minimum Viable Digital Industry – MVDI):

Seclab Xchange provides physical segmentation between networks with different trust levels: between IT and OT, between the control network and the field network, and between sensitive networks. This segmentation goes beyond software-based filtering by eliminating any direct network connectivity between zones, preventing lateral movement, pivot attacks between IT and OT, and the spread of ransomware across the industrial network.

Programmable Logic Controllers (PLCs), SCADA systems, Historian servers, and Human-Machine Interfaces (HMIs) form the core of operational processes. Seclab Xchange allows these assets to be physically isolated from the rest of the network while permitting only the necessary business flows (data collection, authorized commands) through secure, filtered communications.

Workstations running outdated software (Windows XP, Windows 7, or unsupported systems) pose a major risk as they can no longer receive security patches. Seclab Xchange protects these assets by making them invisible and inaccessible from risky networks, without requiring any modifications to the legacy systems.

Backup servers and log repositories are prime targets for attackers aiming to maximize ransomware impact by destroying backups. Seclab Xchange physically isolates these environments to ensure the integrity of backups, even if the main network is compromised.

For strictly one-way flows—such as sending data to a supervision system, feeding a SOC, or transmitting logs—Seclab Xchange operates in diode mode, ensuring that only the intended data passes in a single direction, with no possibility of return.

In cases of company acquisition, joint ventures, or mobile systems, it may be necessary to connect an external IT system whose security level is not fully controlled. Seclab Xchange enables this connection by physically isolating the external IT system from the internal network, allowing only the necessary application data to pass through.

Seclab Xchange directly addresses the network segmentation requirements imposed by IEC 62443, NIS2, and DORA. Its electronic protocol break provides the highest level of protection against intentional breaches (SL-3 to SL-4 according to IEC 62443).

Seclab Xchange enables the filtering of file exchanges between two zones with different security levels: filtering by file extensions, size, MIME type, or file signatures, and controlling user and server access to the files.

Thanks to its Zero-Trust administration, Seclab Xchange allows the strict isolation of two environments under different jurisdictions or sensitivity levels. Each party retains exclusive access control on its side: no data flow can occur without the agreement of both administrators. This mechanism ensures that a third-party provider or service subject to extraterritorial laws—such as the U.S. CLOUD Act or Chinese data security regulations—cannot access the protected assets on the other side, even under a legal order. The organization thus retains full sovereignty over its critical systems and data.

Protect What’s Vital to Your Business.

WHAT EXPERTS SAY ABOUT OT NETWORK SEGMENTATION WITH ELECTRONIC AIRGAP

Logo de McKinsey & Company, qui parle de segmentation réseau OT
With their robust and certified products, they discovered a niche at the interface of the IT and OT worlds. That proved to be a goldmine.
Logo de BCG, qui parle de segmentation réseau OT
A unique technology with a European DNA, powered by a team of security professionals who understand the security needs of the world’s most critical OT networks, differentiates Seclab from its competitors.
Logo de Gartner, qui parle de segmentation réseau OT
Besides blocking network cyberattacks, any intruders who have penetrated your IT network and are performing reconnaissance will never be able to see any information about your OT network. Wam Voster, Cool Vendors in Cyber-Physical Systems Security
Logo de Amossys, qui parle de segmentation réseau OT

All security functions have undergone penetration testing and none present exploitable vulnerabilities in the context of product use and for the targeted attacker level. Full access to the administration interface of the at-risk network was provided as part of the evaluation. CPSN Evaluation Report

10 years

MTBF (Mean-Time Between Failure)

Logo de la certification CSPN

CSPN Certification

Logo de NREL

Certified best product for network segmentation

MTBF (Mean-Time Between Failure)

CSPN Certification

Certified best product for network segmentation

BENCHMARK

Alternative to Industrial Firewalls and Data Diodes

Operational Capabilities
Firewalls Data Diodes Electronic AirGap (SECLAB Xchange)
Bidirectional communication
Yes Limited (requires workaround) Yes
TCP/IP support Yes Limited (Proxy) Yes
Encrypted protocol support Yes Limited (Complex) Yes
Protocol break No Limited Yes (OSI layers 1-4)
Remote management Yes Limited Limited
Application compatibility High Low High
Implementation complexity Moderate High

Low to moderate (limitation: cannot be virtualized)

Maintenance effort High Low Very low
File signature and verification No No Yes
Threat Protection
Firewalls Data Diodes Electronic AirGap (SECLAB Xchange)
Resilience to compromise No No Yes
Zero-Day exploits
Vulnerable
High Protection (One-Way)
High Protection (Two-Way)
Network reconnaissance Limited protection
High Protection
High Protection
Lateral movement Limited protection
High Protection
High Protection
Malformed packets Limited protection
High Protection
High Protection
Malicious administrator
Vulnerable
Limited protection
High Protection

ADDITIONAL RESOURCES

Your OT Environment Deserves Defense in Depth

> For securing assets using USB devices, discover Seclab Xport.

> For discovering your OT infrastructure and detecting threats or anomalies, discover Seclab Xplore.

> Xchange, Xport, and Xplore are part of the Seclab XCore Platform, providing lasting confidence in the cybersecurity of operational and industrial environments.

> Discover Seclab Xcore Platform, the cybersecurity platform designed by OT experts for OT environments.

Protect What’s Vital to Your Business.

Frequently Asked Questions

What is Electronic AirGap and how does it work?2026-04-01T19:51:00+02:00

Electronic AirGap is a cybersecurity hardware device that creates a complete physical separation between two networks through an electronic protocol break. Developed and patented by Seclab, it removes layers 1 to 4 of the OSI model between the two networks: no TCP/IP stack crosses the system. Only the useful data (files or application data) is transmitted from one side to the other via a non-routable electronic bus.

How does it work in practice?
The architecture relies on three independent processors, each dedicated to a distinct security function. Two separate access controls—one for incoming traffic, one for outgoing—enforce security policies that must be consistent with each other. The useful data is analyzed during transit (protocol verification, file signature checks, anti-malware scanning) before being reconstructed on the destination network.

How it differs from traditional filtering devices

  • Protected assets are invisible and inaccessible from the at-risk network—there is no network route to exploit.
  • The attack surface is reduced by design, not by configuration.
  • The system is resilient to its own compromise: even if a processor is compromised, the compartmentalized architecture prevents propagation.

Electronic AirGap is CSPN-certified by ANSSI. It is installed between two networks without modifying the existing architecture, making it particularly suitable for OT environments (energy, transportation, industry, defense, telecom, water and waste) where availability is critical and maintenance windows are limited.

Key takeaway – Electronic AirGap physically removes network connectivity between two zones through electronics. It makes protected assets invisible from the at-risk network without requiring any architectural changes.

Electronic AirGap vs. Data Diode: What’s the Difference?2026-04-01T19:54:51+02:00

The main difference lies in the direction of communication: a data diode enforces a strictly unidirectional flow, while the Electronic AirGap provides equivalent physical isolation while allowing secure bidirectional exchanges.

Structural limitations of a data diode
A network diode is effective for one-way information flows (to a SOC or Historian, for example). However, many OT use cases require two-way communication: remote administration, file synchronization, industrial protocols with acknowledgments. Some solutions bypass this limitation by combining two diodes with synchronization gateways, which increases complexity and introduces high latency.

What Electronic AirGap adds

Criteria Data diode Electronic Air Gap Seclab
Communication direction Unidirectional only Unidirectional et bidirectional
Physical isolation Yes Yes (protocol break)
Bidirectional throughput
Not applicable (or severely degraded via double diode)
Up to 800 Mbps
Additional software on network side
Often required Not required
Resistance to internal compromise Partial Yes (3-compartment processor architecture)

 

The Electronic AirGap therefore combines the strict isolation of a diode with the operational flexibility required by modern industrial environments.

Key takeaway– Electronic AirGap provides the same level of physical isolation as a data diode, but supports bidirectional communications up to 800 Mbps, without additional software components and without compromising security.

Electronic AirGap vs. OT Firewall: Which Protection to Choose?2026-04-01T19:56:56+02:00

An OT firewall filters network traffic according to configurable rules. The Electronic AirGap, on the other hand, completely eliminates network connectivity between two zones. These are complementary approaches: the firewall controls traffic flows, while the Electronic AirGap removes the very possibility of unauthorized network traffic.

Why a firewall alone is not enough in OT environments

Industrial firewalls have several vulnerabilities in operational contexts:

  • They require regular updates (firmware, signatures, rules), often incompatible with maintenance windows limited to a few hours per year.
  • They rely on software and remain vulnerable to configuration errors, zero-day exploits, and attacks targeting TCP/IP layers.
  • Their effectiveness depends on the quality and constant updating of their rules.

The Electronic AirGap approach

By removing the transport and network layers through an electronic protocol break, the Electronic AirGap inherently eliminates an entire category of attacks. Maintenance is minimal: on average, one software update per year. Protection does not rely on up-to-date signatures or rule maintenance.

The Electronic AirGap does not systematically replace a firewall. It complements it within a defense-in-depth strategy, protecting the most critical perimeter—where a compromise would have major operational impact.

Key takeaway — Where a firewall filters traffic, the Electronic AirGap breaks network continuity. Both are complementary: the firewall for routine segmentation, the Electronic AirGap for isolating the most critical assets.

How to Comply with NIS 2 Using Physical Network Isolation?2026-04-01T19:58:51+02:00

Physical isolation via Electronic AirGap directly addresses the network segmentation and risk management requirements of the NIS 2 Directive (Article 21). By eliminating any direct network connection between the protected zone and the at-risk zone, it prevents lateral movement and makes critical assets inaccessible.

Which NIS 2 requirements are covered?

  • Cyber risk management (Art. 21): Physical isolation is a proportionate and demonstrable risk-reduction measure, especially for critical assets.
  • Supply chain security: Systems interconnected with third parties (service providers, suppliers) are physically isolated, limiting the risk of compromise via lateral attacks.
  • Business continuity: The integrity of critical systems is ensured without relying on frequent updates—a key factor in OT environments where every downtime has an operational cost.

Progressive compliance

NIS 2 does not require a full-scale overhaul overnight. The Seclab XCore platform enables step-by-step maturity: asset discovery and threat detection with Xplore, followed by isolation of critical systems with Xchange (Electronic AirGap). This gradual approach aligns with the directive’s intent, which calls for measures adapted to the organization’s risk level and maturity.

Key takeaway — Electronic AirGap addresses three key areas of NIS 2: risk management, supply chain security, and business continuity. Combined with Xplore for visibility, it enables progressive compliance tailored to OT constraints.

How to Comply with IEC 62443 Using Physical Network Isolation?2026-04-01T20:01:17+02:00

Electronic AirGap integrates into the zones-and-conduits architecture defined by IEC 62443. Positioned as a conduit between two zones with different security levels, it provides a level of protection corresponding to the highest Security Levels (SL-3 to SL-4).

The zones-and-conduits model in practice

IEC 62443 is based on a clear principle: group assets by security requirement level (zones) and strictly control communications between zones (conduits). Each conduit must guarantee a target security level (Security Level Target) appropriate to the threat.

Why Electronic AirGap meets SL-3 / SL-4 levels

  • The protocol break ensures physical isolation—the highest level of protection against intentional breaches using sophisticated means.
  • Dual independent access controls (inbound/outbound) meet the standard’s requirements for granular control.
  • The principle of least privilege is respected: only explicitly authorized business flows are allowed.

Electronic AirGap protects critical zones (PLCs, SCADA, Historian) while allowing necessary operational traffic. Its deployment without modifying the existing architecture enables progressive compliance, even in legacy environments where equipment replacement is not feasible.

Key takeaway In the IEC 62443 model, Electronic AirGap acts as a high-security conduit (SL-3/SL-4) between critical zones and at-risk zones. Deployment is possible without overhauling the existing architecture.

Should All OT Assets Be Protected in the Same Way?2026-04-01T20:05:30+02:00

No. Not all equipment in an OT environment has the same level of criticality. Applying maximum protection everywhere leads to disproportionate costs and complexity, which can itself harm availability.

The MVDI Principle (Minimum Viable Digital Industry)

MVDI refers to the set of digital assets vital for the proper functioning of industrial operations. The goal is to identify this critical perimeter—production PLCs, SCADA, Historian, safety systems—and focus the strongest protection measures there.

Which protection for which level of criticality?

Criticality Level
Example assets Recommended Protection
Critical (MVDI)
PLCs, SCADA, Historian, safety systems, sensitive application servers
Physical isolation (Electronic AirGap)
Important Standard application servers, engineering workstations Network segmentation (firewall, VLAN)
Standard
Office workstations, non-critical systems
Standard IT security measures

This approach aligns with IEC 62443, which formalizes differentiated security levels by zone. It maximizes risk reduction while controlling costs and operational impact.

Key takeawayFocus maximum protection (physical isolation) on MVDI assets, and adapt security levels for other assets according to their actual criticality. This provides the best security-to-cost ratio in OT environments.

Go to Top