Watch on YouTube
Watch on Vimeo
This Elisity presentation at Network Field Day 36 focuses on how the convergence of IT and OT networks has created unique cybersecurity challenges across manufacturing, pharmaceutical, and healthcare sectors, where legacy systems, unmanaged devices, and critical operations intersect. This technical talk explores how microsegmentation addresses the distinct security requirements of these regulated industries.
In manufacturing environments, the primary challenge lies in securing industrial control systems that often run on legacy operating systems and utilize proprietary protocols. Organizations must maintain IEC 62443 compliance while enabling secure communication between production zones, enterprise IT systems, and remote access points. Critical goals include protecting intellectual property in manufacturing execution systems (MES) while ensuring zero operational downtime.
Pharmaceutical companies face the additional complexity of FDA-regulated environments where Good Manufacturing Practice (GMP) systems require both rigorous access controls and detailed audit trails. These organizations need microsegmentation solutions that can isolate quality control systems, laboratory information management systems (LIMS), and research data while maintaining strict regulatory compliance. Healthcare institutions struggle with an explosion of IoMT (Internet of Medical Things) devices that can’t support traditional security agents.
Meeting 405(d) HICP guidelines requires organizations to implement microsegmentation without disrupting critical care devices or patient monitoring systems. The challenge intensifies with the need to segment clinical networks from billing systems while maintaining HIPAA compliance.
Learn how modern microsegmentation architectures and platforms like Elisity address these challenges. You’ll see how Elisity’s Identity-based microsegmentation platform enables policy enforcement at the network edge, leveraging existing switch infrastructure for policy enforcement.
Learn why success requires continuous asset discovery, automated policy recommendations based on learned traffic patterns, and the ability to enforce segmentation policies without requiring hardware refresh or network redesign.
Personnel: Dana Yanch, Piotr Kupisiewicz
Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.
We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.
Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!