{"id":28336,"date":"2025-07-08T09:10:22","date_gmt":"2025-07-08T07:10:22","guid":{"rendered":"https:\/\/www.cubro.com\/en\/?page_id=28336"},"modified":"2025-07-08T10:05:11","modified_gmt":"2025-07-08T08:05:11","slug":"ot-security","status":"publish","type":"page","link":"https:\/\/www.cubro.com\/en\/why-cubro\/ot-security\/","title":{"rendered":"OT Security"},"content":{"rendered":"\n<div class=\"wp-block-getwid-section alignfull alignfull getwid-section-content-full-width\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-top:50px;padding-bottom:30px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#052942;background-image:linear-gradient(135deg,rgb(104,136,159) 26%,rgb(204,219,230) 96%)\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" id=\"g51cdf6af5be5\" style=\"font-size:54px\"><h1 class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\" style=\"text-align:left;font-weight:300;line-height:65px\">OT Security<\/h1><\/div>\n\n\n\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" id=\"\" style=\"font-size:40px\"><p class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\" style=\"text-align:left;font-weight:300;line-height:50px\">Enhancing OT Security with Network Visibility Solutions<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" width=\"1119\" height=\"1280\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Graphic-OTSecurity-062025-1119x1280.png\" alt=\"\" class=\"wp-image-28413\" style=\"width:448px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Graphic-OTSecurity-062025-1119x1280.png 1119w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Graphic-OTSecurity-062025-420x480.png 420w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Graphic-OTSecurity-062025-210x240.png 210w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Graphic-OTSecurity-062025-768x879.png 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Graphic-OTSecurity-062025-1343x1536.png 1343w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Graphic-OTSecurity-062025.png 1500w\" sizes=\"(max-width: 1119px) 100vw, 1119px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-section\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><nav aria-label=\"breadcrumbs\" class=\"rank-math-breadcrumb\"><p><span class=\"last\">Home<\/span><\/p><\/nav>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-m wp-block-getwid-section alignwide alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\" style=\"background-color:var(--nv-site-bg)\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:30px\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#12668d\">Content Guide<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-container ticss-9a863615 uagb-layout-flex uagb-block-2e798cda default uagb-is-root-container\">\n<div class=\"wp-block-getwid-table-of-contents alignwide is-style-default\"><ul class=\"wp-block-getwid-table-of-contents__list\"><li><a href=\"#ge175db6cb999\">OT Networks<\/a><\/li><li><a href=\"#g6d3318ca67dd\">Benefits of a Dedicated OT Network Visibility Infrastructure<\/a><\/li><li><a href=\"#gb71894682d50\">Tailored Solutions for Base-T (Copper) OT Networks<\/a><\/li><li><a href=\"#gecdd0bbfbea1\">OT Security with Cubro<\/a><\/li><\/ul><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"750\" height=\"793\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-with-laptop.jpg\" alt=\"\" class=\"wp-image-28349\" style=\"width:388px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-with-laptop.jpg 750w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-with-laptop-454x480.jpg 454w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-with-laptop-227x240.jpg 227w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\"><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#a9becd\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"ge175db6cb999\"><h2 class=\"wp-block-getwid-advanced-heading__content\" style=\"text-align:center\">OT Networks<\/h2><\/div>\n\n\n\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:25px\"><p class=\"wp-block-getwid-advanced-heading__content\">Why Visibility Matters in OT Networks<\/p><\/div>\n\n\n\n<p>In today\u2019s industrial environments, Operational Technology (OT) networks are no longer isolated systems. Once protected by an air gap<sup> <\/sup>(a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks) and physical separation, OT systems now connect with IT networks to support real-time monitoring, predictive maintenance, and centralised data analysis. This IT\/OT convergence, while beneficial for efficiency, opens the door to new cybersecurity threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g6c2d76c2bffd\"><h3 class=\"wp-block-getwid-advanced-heading__content\">What is Operational Technology (OT)?<\/h3><\/div>\n\n\n\n<p>NIST defines OT as comprising a broad range of programmable systems and devices that interact with the physical environment. These systems and devices detect or cause a direct change by monitoring and\/or controlling devices, processes, and events. Examples include industrial control systems (ICS), building automation systems, transportation systems, physical access control systems, physical environment monitoring systems, and physical environment measurement systems.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"750\" height=\"800\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/lock-over-city.jpg\" alt=\"\" class=\"wp-image-28347\" style=\"width:374px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/lock-over-city.jpg 750w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/lock-over-city-450x480.jpg 450w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/lock-over-city-225x240.jpg 225w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The primary difference between OT and IoT lies in their scope and focus. While IoT collects and exchanges data, OT focuses on monitoring and controlling physical processes and equipment. From a security perspective, IoT security focuses on protecting connected devices and their data, while OT ensures the availability and safety of the systems and processes.<\/p>\n\n\n\n<p>Some of these OT characteristics include significant risks to the health and safety of human lives, serious damage to the environment, and severe financial issues, such as production losses, negative impacts on the nation\u2019s economy, and the compromise of proprietary information.&nbsp;<\/p>\n\n\n\n<p>OT has unique performance and reliability requirements and often uses OSs and applications that may be considered unconventional by typical IT personnel. Furthermore, the goals of safety and efficiency sometimes conflict with security in the design and operation of OT systems.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#a9becd\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"gd2647ed9fa36\"><h3 class=\"wp-block-getwid-advanced-heading__content\">Operational Technology development<\/h3><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Initially, OT systems were isolated, ran proprietary control protocols, and used specialised hardware and software. Over time, OT systems have adopted IT practices to enable corporate business systems connectivity and remote access capabilities and are designed and implemented using industry-standard computers, operating systems (OSs), and network protocols. This has made them resemble IT systems with obvious benefits, but has also brought new challenges.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>OT systems are now less isolated from the outside world than their predecessors, creating a greater need to secure OT systems. Point-to-point serial cables are increasingly changed to wireless solutions, thus creating a higher risk from adversaries who don\u2019t need any more physical access to the cables. While security solutions have been designed to deal with these issues in typical IT systems, special precautions must be taken when introducing these same solutions to OT environments. In some cases, new tailored security solutions are needed.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g5d912b4b87b4\"><h3 class=\"wp-block-getwid-advanced-heading__content\">OT Devices and Industrial Control Systems (ICS)<\/h3><\/div>\n\n\n\n<p>Legacy OT devices and industrial control systems (ICS) have not been designed to face modern cyber threats. As these systems become more connected, often without robust security protocols, they become attractive targets for ransomware, unauthorised access, and advanced persistent threats (APT). What was once considered a secure, standalone network is now a critical part of an organisation&#8217;s larger and more vulnerable digital ecosystem.<\/p>\n\n\n\n<p>Some OT protocols are 45 years old, and they were designed for serial interfaces to be used in SCADA systems. There are a plethora of protocols used today, Modbus, DNP(3), IEC 61850 and Siemens S7, to mention a few. Today, the protocols can be encapsulated with TCP\/IP or UDP. This enables the use of more flexible packet routing and also makes it possible to share packets with various destinations using TAP and NPB. Wireshark can also be used to analyse the protocols. Below you can find a screenshot of Wireshark. The data is from <a href=\"https:\/\/www.netresec.com\/?page=PCAP4SICS\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.netresec.com\/?page=PCAP4SICS<\/a> using <a href=\"https:\/\/cs3sthlm.se\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cs3sthlm.se\/<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1280\" height=\"473\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Wireshark-screenshot-1280x473.jpg\" alt=\"\" class=\"wp-image-28350\" style=\"width:1061px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Wireshark-screenshot-1280x473.jpg 1280w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Wireshark-screenshot-480x177.jpg 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Wireshark-screenshot-240x89.jpg 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Wireshark-screenshot-768x284.jpg 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Wireshark-screenshot.jpg 1500w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-getwid-advanced-heading\"><p class=\"wp-block-getwid-advanced-heading__content\" style=\"padding-top:30px\">This screenshot shows Wireshark\u2019s ability to open S7comm protocol from Siemens. It also practically demonstrates that TCP\/IP-based or encapsulated protocols can be accompanied by DNS queries, showing the added security aspects to be aware of.<\/p><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#a9becd\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g8678c00796e1\"><h3 class=\"wp-block-getwid-advanced-heading__content\">Purdue Model<\/h3><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p>Although the air-gap is no more a part of OT, it has had its comeback. The Purdue Model was designed as a reference model for data flows in computer-integrated manufacturing (CIM). This model later came to define the standard for building an ICS network architecture that supports OT security by separating the layers of the network. This separation allows for the maintenance of a hierarchical flow of the data between said layers. It illustrates the implementation of an air-gap between ICS\/OT systems and IT systems.<\/p>\n\n\n\n<p>The Purdue model has five levels. Field devices such as sensors and actuators are on the lowest level, 0. Level 1 includes local controllers, such as Programmable Logic Controllers (PLC). In recent times, levels 0 and 1 are combined. Level 2 introduces local supervision with alarm servers, historians and the control room. Site-wide supervisory is on the level 3 with management servers and with similar equipment as on level 2, but at the site level. Purdue model recommends DMZ for IT\/OT boundary before entering level 4 with business systems. Level 5 is the enterprise network layer with Active Directory, Internal email, CRM&nbsp; and Security Operations Centre.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"716\" height=\"950\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/OTSecurity-PurdueModel.jpg\" alt=\"\" class=\"wp-image-28398\" style=\"width:349px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/OTSecurity-PurdueModel.jpg 716w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/OTSecurity-PurdueModel-362x480.jpg 362w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/OTSecurity-PurdueModel-181x240.jpg 181w\" sizes=\"(max-width: 716px) 100vw, 716px\" \/><\/figure><\/div><\/div>\n<\/div>\n\n\n\n<p>The Purdue model was never intended to be a cybersecurity reference model. It was created to depict best practices for managing the segmentation between the enterprise and industrial segments. Nevertheless, it has remained prevalent as a conceptual framework in IT\/OT security adopted by many security vendors.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"gc473af7bef37\"><h3 class=\"wp-block-getwid-advanced-heading__content\">NIST recommendation for OT<\/h3><\/div>\n\n\n\n<p>Based on NIST recommendations, primary security objectives for an OT implementation should include the following:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Restrict logical access to the OT network, network activity, and systems.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Restrict physical access to the OT network and devices.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Protect individual OT components from exploitation.&nbsp;<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Restrict unauthorised modification of data.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Maintain functionality during adverse conditions.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Restore and recover the system after an incident.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p>A prerequisite for OT security is the inventory of the assets in the network. Inventory can be performed using either passive discovery or active polling. Passive discovery requires a longer time to detect the devices, but its interaction with the network is smaller. Typically, the data is collected using port spanning with the existing switches. If there are no existing switches, installation of either a TAP or a switch is needed. This creates a challenge, as in most cases, the maintenance window for OT occurs only once a year. If the installation isn\u2019t successful, the network can go down, causing significant losses.&nbsp;<\/p>\n\n\n\n<p>Another approach is to poll devices actively. This method provides more details about the devices, but can cause problems if the polling messages are not formulated exactly correctly.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Several security companies are proponents of network segmentation and traffic analytics for threats and vulnerabilities. Similar to IT security, user identity and access management are essential components for security. The protection needs to be extended to both wired and wireless access.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#a9becd\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"gd538f35a784a\"><h3 class=\"wp-block-getwid-advanced-heading__content\">OT Network Monitoring<\/h3><\/div>\n\n\n\n<p>When OT networks implement packetised transport, it is essential to have visibility into the traffic. Organisations must be able to monitor every packet, every port, and every protocol across their industrial infrastructure. Visibility enables security teams to:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-nv-site-bg-color has-text-color has-background has-link-color wp-elements-5752c1663a9a237c98024e1a06e75ba0 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:18px\"><span class=\"wp-block-getwid-advanced-heading__content\">Detect and respond to anomalies before they escalate<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-nv-site-bg-color has-text-color has-background has-link-color wp-elements-85be436b1569430b2542245f95f12ed0 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:18px\"><span class=\"wp-block-getwid-advanced-heading__content\">Prevent unauthorised access to critical systems<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-nv-site-bg-color has-text-color has-background has-link-color wp-elements-4eb4489804ff0dd358a466356cd1407f is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:18px\"><span class=\"wp-block-getwid-advanced-heading__content\">Monitor performance and ensure system availability<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-nv-site-bg-color has-text-color has-background has-link-color wp-elements-0ed1678171b430a1d0dc3948375f5853 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:18px\"><span class=\"wp-block-getwid-advanced-heading__content\">Conduct forensic investigations and root cause analysis<\/span><\/div>\n<\/div>\n<\/div>\n\n\n\n<p>Cubro\u2019s network TAPs and packet brokers provide unfiltered, lossless access to all traffic, eliminating blind spots and enabling deep traffic inspection, without disrupting operations.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g6d3318ca67dd\"><h2 class=\"wp-block-getwid-advanced-heading__content\" style=\"text-align:center\">Benefits of a Dedicated OT Network Visibility Infrastructure<\/h2><\/div>\n\n\n\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g8e353fe87f46\"><h3 class=\"wp-block-getwid-advanced-heading__content\">Complete Visibility &amp; Elimination of Blind Spots<\/h3><\/div>\n\n\n\n<p>Cubro TAP (Test Access Point) devices offer 100% hardware-based visibility into OT network traffic, delivering complete, unfiltered access without dropping a single packet. Unlike software-based SPAN or switch port mirroring, which often results in packet loss, jitter, or incomplete data capture, Cubro TAPs operate passively and reliably at the physical layer, ensuring no interference with live operations.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/social-media-image_copper-flex-tap.png\" alt=\"\" class=\"wp-image-28351\" style=\"width:795px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/social-media-image_copper-flex-tap.png 1200w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/social-media-image_copper-flex-tap-480x251.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/social-media-image_copper-flex-tap-240x125.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/social-media-image_copper-flex-tap-768x401.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-getwid-advanced-heading\"><p class=\"wp-block-getwid-advanced-heading__content\" style=\"padding-top:30px\">This true line-rate visibility is essential for uncovering hidden threats and abnormal behaviour in OT environments. From PLC communication anomalies to unauthorised device access, you can\u2019t detect what you can\u2019t see, and Cubro ensures you see it all.<\/p><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#ccdbe6\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g928bf6f91d4e\"><h3 class=\"wp-block-getwid-advanced-heading__content\">Seamless Integration with Security &amp; Monitoring Tools<\/h3><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p>Cubro\u2019s Network Packet Brokers (NPBs) act as intelligent traffic managers, aggregating data from multiple TAPs, filtering relevant traffic, and forwarding it to security and monitoring platforms. This ensures your IDS, SIEM, SOC, and analytics tools receive exactly the data they need &#8211; nothing more, nothing less.<\/p>\n\n\n\n<p>By optimising traffic flow, Cubro NPBs help prevent tool overload, preserve the performance of security systems, and maximise ROI on your existing monitoring infrastructure. Whether it&#8217;s an intrusion detection system or a real-time monitoring dashboard, Cubro\u2019s platform fits seamlessly into any industrial cybersecurity architecture.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"153\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/EX5-3_T_small.png\" alt=\"Cubro EX5-3 Network Packet Broker, top view\" class=\"wp-image-14231\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/EX5-3_T_small.png 624w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/EX5-3_T_small-480x118.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/EX5-3_T_small-240x59.png 240w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g4fe41def9196\"><h3 class=\"wp-block-getwid-advanced-heading__content\">Real-Time Monitoring for Proactive Threat Detection<\/h3><\/div>\n\n\n\n<p>In OT environments, where uptime and safety are critical, every second counts. Cubro enables real-time monitoring by capturing live traffic directly from the network. This empowers security teams to detect anomalies, policy violations, or suspicious behaviour as it happens, not after the damage is done.<\/p>\n\n\n\n<p>OT systems vary a lot depending on the industry and purpose of the system. It would be tempting to offer TAP and network packet broker to standardise the collection, filtering and redistribution of the packets, but it may not always be the optimal solution. Old OT networks may be better left alone and protected with network segmentation. With new OT networks, it is highly recommended to design the security into the solution from the beginning including TAP and NPB.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#ccdbe6\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"gc815628ff900\"><h3 class=\"wp-block-getwid-advanced-heading__content\">How Cubro\u2019s Solution Strengthens OT Security<\/h3><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"750\" height=\"687\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-at-work.jpg\" alt=\"\" class=\"wp-image-28348\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-at-work.jpg 750w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-at-work-480x440.jpg 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/men-at-work-240x220.jpg 240w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p>As industrial networks continue their digital transformation, protecting Operational Technology (OT) environments from emerging threats becomes a top priority. The convergence of IT and OT networks increases exposure to cyber risks, making it critical to implement a dedicated, high-performance network visibility layer. Cubro provides a robust and scalable approach to OT visibility that significantly enhances cybersecurity posture across industrial systems.<\/p>\n\n\n\n<p>In contrast to traditional methods like switch port mirroring, often prone to packet loss and limited insight, Cubro\u2019s hardware-based TAPs (Test Access Points) deliver full visibility into network traffic without disrupting operations. These devices passively capture every bit and byte, ensuring a lossless and faithful copy of all data flows.<\/p>\n\n\n\n<p>By eliminating visibility gaps and delivering unfiltered access to traffic from critical infrastructure, Cubro empowers OT teams to identify anomalies, policy violations, and potential threats before they impact operations.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g3ed31b97c0c2\"><h3 class=\"wp-block-getwid-advanced-heading__content\">Optimised Integration with Cybersecurity Infrastructure<\/h3><\/div>\n\n\n\n<p>To ensure security tools operate at peak efficiency, Cubro\u2019s Network Packet Brokers act as intelligent intermediaries &#8211; aggregating, filtering, and distributing traffic to monitoring platforms such as Intrusion Detection Systems (IDS), Security Information and Event Management (SIEM) platforms, and Security Operations Centres (SOC).<\/p>\n\n\n\n<p>This means you can maximise the value of your existing cybersecurity investments, avoid oversaturating tools with irrelevant data, and tailor traffic delivery for improved detection accuracy\u2014all while maintaining the performance of mission-critical OT systems.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#a9becd\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"gb71894682d50\"><h2 class=\"wp-block-getwid-advanced-heading__content\" style=\"text-align:center;padding-bottom:30px\">Tailored Solutions for Base-T (Copper) OT Networks<\/h2><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1280\" height=\"631\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/tech-graphic_EX5-3-bg-1280x631.png\" alt=\"\" class=\"wp-image-28353\" style=\"width:815px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/tech-graphic_EX5-3-bg-1280x631.png 1280w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/tech-graphic_EX5-3-bg-480x237.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/tech-graphic_EX5-3-bg-240x118.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/tech-graphic_EX5-3-bg-768x379.png 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/tech-graphic_EX5-3-bg.png 1500w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-getwid-advanced-heading\"><p class=\"wp-block-getwid-advanced-heading__content\" style=\"padding-top:40px\">Many industrial environments still operate on copper-based infrastructure. Cubro delivers fit-for-purpose solutions that bridge legacy systems with modern security demands:<\/p><\/div>\n\n\n\n<div class=\"wp-block-getwid-advanced-heading\" id=\"gc4ec8293b3a7\"><h3 class=\"wp-block-getwid-advanced-heading__content\">FlexTAP Copper Chassis Solutions<\/h3><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Scalable chassis with up to 21 TAP modules in just 3RU<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Fail-safe, hot-swappable architecture for uninterrupted deployments<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Industry-leading space efficiency and power flexibility<\/span><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g65f9ec05e3ec\"><h3 class=\"wp-block-getwid-advanced-heading__content\">EX5-3 Network Packet Broker<\/h3><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">48 native RJ45 ports for 10\/100\/1000 Base-T environments<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Intuitive UI and granular filtering, ideal for converged OT\/IT environments<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#557991;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">4 x 1\/10G SFP+ ports to connect fiber-based monitoring tools<\/span><\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"gecdd0bbfbea1\"><h2 class=\"wp-block-getwid-advanced-heading__content\" style=\"text-align:center\">OT Security with Cubro<\/h2><\/div>\n\n\n\n<p><strong>With over two decades of experience in network visibility<\/strong>, Cubro delivers proven solutions that enhance OT security, reduce operational risk, and provide the transparency needed to protect critical infrastructure.<\/p>\n\n\n\n<p>Cubro\u2019s solution benefits:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ccdbe6;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\">Lossless traffic capture from copper or optical-based OT environments<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ccdbe6;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\">Seamless integration with IDS, SIEM, and SOC tools<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ccdbe6;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\">Scalable solutions for future-proofing your OT visibility layer<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#ccdbe6;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\">Hardware-based architecture with high performance without packet drops<\/span><\/div>\n<\/div>\n<\/div>\n\n\n\n<p>Selecting the right network visibility infrastructure for OT environments is critical. OT systems prioritise availability and safety, and visibility solutions must respect these operational requirements while enhancing security and observability.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#ccdbe6\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column has-nv-site-bg-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"lazyblock-linked-box-ZnioNi wp-block-lazyblock-linked-box\"><a href=\"https:\/\/www.cubro.com\/en\/solutions\/enhancing-ot-network-security\/\"><div class=\"linked_box max-height-120\" style=\"text-align:center;\"><div class=\"default-content\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/solutions-single_ot-security-solution.png\" alt=\"Cubro Network Visibility icon of OT security solution\" \/><p class=\"linked-title\">Enhancing OT Network Security<\/p><\/div><\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section\" style=\"margin-top:30px\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div id=\"npb-contact-anchor\" class=\"wp-block-getwid-section\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Contact Us for a Consultation<\/strong><\/p>\n\n\n<style id=\"wpforms-css-vars-25740\">\n\t\t\t\t#wpforms-25740 {\n\t\t\t\t--wpforms-field-size-input-height: 43px;\n--wpforms-field-size-input-spacing: 15px;\n--wpforms-field-size-font-size: 16px;\n--wpforms-field-size-line-height: 19px;\n--wpforms-field-size-padding-h: 14px;\n--wpforms-field-size-checkbox-size: 16px;\n--wpforms-field-size-sublabel-spacing: 5px;\n--wpforms-field-size-icon-size: 1;\n--wpforms-label-size-font-size: 16px;\n--wpforms-label-size-line-height: 19px;\n--wpforms-label-size-sublabel-font-size: 14px;\n--wpforms-label-size-sublabel-line-height: 17px;\n--wpforms-button-size-font-size: 17px;\n--wpforms-button-size-height: 41px;\n--wpforms-button-size-padding-h: 15px;\n--wpforms-button-size-margin-top: 10px;\n--wpforms-container-shadow-size-box-shadow: none;\n\t\t\t}\n\t\t\t<\/style><div class=\"wpforms-container wpforms-container-full wp-form-css wpforms-render-modern\" id=\"wpforms-25740\"><form id=\"wpforms-form-25740\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"25740\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/en\/wp-json\/wp\/v2\/pages\/28336\" data-token=\"204cf066f67aa46b9bc9a519619df60c\" data-token-time=\"1775405146\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div id=\"wpforms-error-noscript\" style=\"display: none;\">Please enable JavaScript in your browser to complete this form.<\/div><div class=\"wpforms-field-container\"><div id=\"wpforms-25740-field_4-container\" class=\"wpforms-field wpforms-field-layout\" data-field-id=\"4\"><div class=\"wpforms-field-layout-rows wpforms-field-large\"><div class=\"wpforms-layout-row\"><div class=\"wpforms-layout-column wpforms-layout-column-50\"><div id=\"wpforms-25740-field_0-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"0\"><label class=\"wpforms-field-label\" for=\"wpforms-25740-field_0\">Name <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-25740-field_0\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][0]\" aria-errormessage=\"wpforms-25740-field_0-error\" required><\/div><\/div><div class=\"wpforms-layout-column wpforms-layout-column-50\"><div id=\"wpforms-25740-field_3-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"3\"><label class=\"wpforms-field-label\" for=\"wpforms-25740-field_3\">Country <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-25740-field_3\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][3]\" aria-errormessage=\"wpforms-25740-field_3-error\" required><\/div><\/div><\/div><div class=\"wpforms-layout-row\"><div class=\"wpforms-layout-column wpforms-layout-column-50\"><div id=\"wpforms-25740-field_5-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"5\"><label class=\"wpforms-field-label\" for=\"wpforms-25740-field_5\">Company <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-25740-field_5\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][5]\" aria-errormessage=\"wpforms-25740-field_5-error\" required><\/div><\/div><div class=\"wpforms-layout-column wpforms-layout-column-50\"><div id=\"wpforms-25740-field_1-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"1\"><label class=\"wpforms-field-label\" for=\"wpforms-25740-field_1\">Email <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"email\" id=\"wpforms-25740-field_1\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][1]\" spellcheck=\"false\" aria-errormessage=\"wpforms-25740-field_1-error\" required><\/div><\/div><\/div><\/div><\/div><div id=\"wpforms-25740-field_6-container\" class=\"wpforms-field wpforms-field-text wpf-disable-field\" data-field-id=\"6\"><label class=\"wpforms-field-label\" for=\"wpforms-25740-field_6\">Subject<\/label><input type=\"text\" id=\"wpforms-25740-field_6\" class=\"wpforms-field-large\" name=\"wpforms[fields][6]\" aria-errormessage=\"wpforms-25740-field_6-error\" ><\/div><div id=\"wpforms-25740-field_2-container\" class=\"wpforms-field wpforms-field-textarea\" data-field-id=\"2\"><label class=\"wpforms-field-label\" for=\"wpforms-25740-field_2\">Message <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><textarea id=\"wpforms-25740-field_2\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][2]\" aria-errormessage=\"wpforms-25740-field_2-error\" aria-describedby=\"wpforms-25740-field_2-description\" required><\/textarea><div id=\"wpforms-25740-field_2-description\" class=\"wpforms-field-description\">This site is protected by reCAPTCHA and the Google <a href=\"https:\/\/policies.google.com\/privacy\" target=\"_blank\" rel=\"noopener\">Privacy Policy<\/a> and <a href=\"https:\/\/policies.google.com\/terms\" target=\"_blank\" rel=\"noopener\">Terms of Service<\/a> apply.<\/div><\/div><\/div><!-- .wpforms-field-container --><div class=\"wpforms-recaptcha-container wpforms-is-recaptcha wpforms-is-recaptcha-type-v3\" ><input type=\"hidden\" name=\"wpforms[recaptcha]\" value=\"\"><\/div><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"25740\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/28336\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-25740\" class=\"wpforms-submit\" data-alt-text=\"sending\u00a0\u2026\" data-submit-text=\"Send message\" aria-live=\"assertive\" value=\"wpforms-submit\">Send message<\/button><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/plugins\/wpforms\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner\" style=\"display: none;\" width=\"26\" height=\"26\" alt=\"Loading\"><\/div><\/form><\/div>  <!-- .wpforms-container -->\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull ticss-463d19d6 alignfull\" style=\"margin-top:60px;margin-bottom:30px\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-top:4px;padding-bottom:0px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background has-nv-dark-bg-background-color\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><div class=\"wp-block-image is-style-default ticss-b2896e02\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CNV-Logo_just-symbol_divider.png\" alt=\"\" width=\"30\" height=\"48\"\/><\/figure><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><p class=\"newsletter-headline\">Newsletter - Stay up to date with Cubro Bytes<\/p><div class=\"zweispaltig\"><div class=\"spalte\" style=\"margin-top:30px;padding-left:30px;padding-right:30px;\">\r\n\t\t\t<div style=\"padding-bottom:15px; text-align:center;\">\r\n\t\t\t  <img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/icon_newsletter.png\" \r\n\t\t\t       width=\"200\" \r\n\t\t\t       style=\"padding-bottom:10px;\">\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<p style=\"font-size:20px;\">Our newsletter provides thought leadership content about the industry. It is concise and has interesting content to keep you updated with what\u2019s new at Cubro and in the industry. You can unsubscribe anytime with a single click.<\/p>\r\n\t\t\t<\/div><div class=\"spalte\"><!-- Begin Brevo Form -->\r\n<!-- START - We recommend to place the below code in head tag of your website html  -->\r\n<style>\r\n  @font-face {\r\n    font-display: block;\r\n    font-family: Roboto;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/7529907e9eaf8ebb5220c5f9850e3811.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/25c678feafdc175a70922a116c9be3e7.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 600;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/6e9caeeafb1f3491be3e32744bc30440.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/71501f0d8d5aa95960f6475d5487d4c2.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 700;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/3ef7cf158f310cf752d5ad08cd0e7e60.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/ece3a1d82f18b60bcce0211725c476aa.woff) format(\"woff\")\r\n  }\r\n\r\n  #sib-container input:-ms-input-placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container input::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container textarea::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container a {\r\n    text-decoration: underline;\r\n    color: #2BB2FC;\r\n  }\r\n\r\n  label.entry__label {\r\n  \tmargin-bottom:1px;\r\n  }\r\n\r\n  .sib-form {\r\n  \tpadding-left:0!important;\r\n  \tpadding-right:0!important;\r\n  }\r\n\r\n  #sib-container {\r\n  \tpadding:0!important;\r\n  }\r\n\r\n  .recaptcha-text {\r\n  \tfont-size:12px!important;\r\n  }\r\n\r\n  .recaptcha-text a {\r\n    color: #d8522c!important;\r\n    text-decoration: underline;\r\n  }\r\n\r\n  button {\r\n    font-size:16px;\r\n    text-align:left;\r\n    font-weight:700;\r\n    font-family:Helvetica, sans-serif;\r\n    color:#FFFFFF;\r\n    background-color:#84a6ad;\r\n    border-radius:3px;\r\n    border-width:8px;\r\n  }\r\n\r\n  button:hover {\r\n    color:#FFFFFF;\r\n    background-color:#333333;\r\n  }\r\n\r\n  \/* --- Brevo Formular: 2-spaltiges Layout f\u00fcr die ersten 4 Felder --- *\/\r\n\r\n  \/* Grid auf die direkten Kinder des <form> anwenden (die Wrapper mit padding) *\/\r\n  #sib-container #sib-form {\r\n    display: grid;\r\n    grid-template-columns: 1fr 1fr;\r\n    column-gap: 16px;\r\n    row-gap: 0; \/* da die Wrapper schon padding haben *\/\r\n  }\r\n\r\n  \/* Alle Wrapper-Blocks standardm\u00e4\u00dfig: eine Spalte *\/\r\n  #sib-container #sib-form > div {\r\n    grid-column: span 1;\r\n  }\r\n\r\n  \/* 5. Block = Email (vollbreit) *\/\r\n  #sib-container #sib-form > div:nth-of-type(5) {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* 6. Block = Button (vollbreit) *\/\r\n  #sib-container #sib-form > div:nth-of-type(6) {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* Hidden Inputs am Ende: vollbreit und ohne Layout-Effekt *\/\r\n  #sib-container #sib-form > input {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* Mobile: alles untereinander *\/\r\n  @media (max-width: 640px) {\r\n    #sib-container #sib-form {\r\n      grid-template-columns: 1fr;\r\n    }\r\n    #sib-container #sib-form > div,\r\n    #sib-container #sib-form > div:nth-of-type(5),\r\n    #sib-container #sib-form > div:nth-of-type(6) {\r\n      grid-column: 1 \/ -1;\r\n    }\r\n  }\r\n\r\n\r\n<\/style>\r\n<link rel=\"stylesheet\" href=\"https:\/\/sibforms.com\/forms\/end-form\/build\/sib-styles.css\">\r\n<!--  END - We recommend to place the above code in head tag of your website html -->\r\n\r\n<!-- START - We recommend to place the below code where you want the form in your website html  -->\r\n<div class=\"sib-form\" style=\"text-align: center; background-color: #ffffff;\">\r\n  <div id=\"sib-form-container\" class=\"sib-form-container\">\r\n    <div id=\"error-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewBox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-11.49 120h22.979c6.823 0 12.274 5.682 11.99 12.5l-7 168c-.268 6.428-5.556 11.5-11.99 11.5h-8.979c-6.433 0-11.722-5.073-11.99-11.5l-7-168c-.283-6.818 5.167-12.5 11.99-12.5zM256 340c-15.464 0-28 12.536-28 28s12.536 28 28 28 28-12.536 28-28-12.536-28-28-28z\" \/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n                          Deine Anmeldung konnte nicht gespeichert werden. Bitte versuche es erneut.\r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"success-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#085229; background-color:#e7faf0; border-radius:3px; border-color:#13ce66;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewBox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 464c-118.664 0-216-96.055-216-216 0-118.663 96.055-216 216-216 118.664 0 216 96.055 216 216 0 118.663-96.055 216-216 216zm141.63-274.961L217.15 376.071c-4.705 4.667-12.303 4.637-16.97-.068l-85.878-86.572c-4.667-4.705-4.637-12.303.068-16.97l8.52-8.451c4.705-4.667 12.303-4.637 16.97.068l68.976 69.533 163.441-162.13c4.705-4.667 12.303-4.637 16.97.068l8.451 8.52c4.668 4.705 4.637 12.303-.068 16.97z\" \/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n                          Deine Anmeldung war erfolgreich.\r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"sib-container\" class=\"sib-container--large sib-container--vertical\" style=\"text-align:center; background-color:rgba(255,255,255,1); max-width:800px; direction:ltr\">\r\n      <form id=\"sib-form\" method=\"POST\" action=\"https:\/\/24bf8055.sibforms.com\/serve\/MUIFAJW5hHXD-knlsGlqSNUcW_X6H-wyIG1XBfBHC1n-r5oWiLIKRNXRDNGHx0jhUUIpnWTh-6f1BKAE6jFyyE4DZupZc0qg-pyk2DusTzZA-sd2kmqr439RPzb-vYZRTRcXHsAxYa16e-8CaDLXh2IKxteM8S8ICusLl-WDN0JwkdZsIhe032CYNNlX8zi1nT5UbXdwGO0854j7\" data-type=\"subscription\">\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"FIRSTNAME\" data-required=\"*\">First Name<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"FIRSTNAME\" name=\"FIRSTNAME\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"LASTNAME\" data-required=\"*\">Last Name<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"LASTNAME\" name=\"LASTNAME\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"COMPANY\">Company<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"COMPANY\" name=\"COMPANY\" autocomplete=\"off\" \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"COUNTRY\">Country<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"COUNTRY\" name=\"COUNTRY\" autocomplete=\"off\" \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"EMAIL\" data-required=\"*\">Email<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" type=\"text\" id=\"EMAIL\" name=\"EMAIL\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n\t\t\t\t<p class=\"recaptcha-text\">This site is protected by reCAPTCHA and the Google <a href=\"https:\/\/policies.google.com\/privacy\" target=\"_blank\" rel=\"noopener\">Privacy Policy<\/a> and <a href=\"https:\/\/policies.google.com\/terms\" target=\"_blank\" rel=\"noopener\">Terms of Service<\/a> apply.\r\n\t\t\t\t<\/p>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"text-align: left\">\r\n            <button class=\"sib-form-block__button sib-form-block__button-with-loader\" form=\"sib-form\" type=\"submit\">\r\n              <svg class=\"icon clickable__icon progress-indicator__icon sib-hide-loader-icon\" viewBox=\"0 0 512 512\" style=\"\">\r\n                <path d=\"M460.116 373.846l-20.823-12.022c-5.541-3.199-7.54-10.159-4.663-15.874 30.137-59.886 28.343-131.652-5.386-189.946-33.641-58.394-94.896-95.833-161.827-99.676C261.028 55.961 256 50.751 256 44.352V20.309c0-6.904 5.808-12.337 12.703-11.982 83.556 4.306 160.163 50.864 202.11 123.677 42.063 72.696 44.079 162.316 6.031 236.832-3.14 6.148-10.75 8.461-16.728 5.01z\" \/>\r\n              <\/svg>\r\n              Subscribe here\r\n            <\/button>\r\n          <\/div>\r\n        <\/div>\r\n\r\n        <input type=\"text\" name=\"email_address_check\" value=\"\" class=\"input--hidden\">\r\n        <input type=\"hidden\" name=\"locale\" value=\"de\">\r\n      <\/form>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n<!-- END - We recommend to place the above code where you want the form in your website html  -->\r\n\r\n<!-- START - We recommend to place the below code in footer or bottom of your website html  -->\r\n<script>\r\n  window.REQUIRED_CODE_ERROR_MESSAGE = 'Please select a country code.';\r\n  window.LOCALE = 'de';\r\n  window.EMAIL_INVALID_MESSAGE = window.SMS_INVALID_MESSAGE = \"The information you entered is invalid. Please check the field format and try again.\";\r\n\r\n  window.REQUIRED_ERROR_MESSAGE = \"This field must not be empty. \";\r\n\r\n  window.GENERIC_INVALID_MESSAGE = \"This field cannot be empty. The information you entered is invalid. Please check the field format and try again.\";\r\n\r\n  window.translation = {\r\n    common: {\r\n      selectedList: '{quantity} Liste ausgew\u00e4hlt',\r\n      selectedLists: '{quantity} Listen ausgew\u00e4hlt',\r\n      selectedOption: '{quantity} ausgew\u00e4hlt',\r\n      selectedOptions: '{quantity} ausgew\u00e4hlt',\r\n    }\r\n  };\r\n\r\n  var AUTOHIDE = Boolean(0);\r\n<\/script>\r\n\r\n<script defer src=\"https:\/\/sibforms.com\/forms\/end-form\/build\/main.js\"><\/script>\r\n\r\n<!-- END - We recommend to place the above code in footer or bottom of your website html  -->\r\n<!-- End Brevo Form --><p style=\"font-size:12px;padding-left:16px;\">Your e-mail address is only used to send you our newsletter and information about the activities of Cubro Network Visibility. You can always use the unsubscribe link included in the newsletter.<\/p><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":0,"parent":27517,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","_uag_custom_page_level_css":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","neve_meta_reading_time":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-28336","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"neve-blog":false},"uagb_author_info":{"display_name":"Gianni","author_link":"https:\/\/www.cubro.com\/en\/blog\/author\/gianni\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/28336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/comments?post=28336"}],"version-history":[{"count":57,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/28336\/revisions"}],"predecessor-version":[{"id":28421,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/28336\/revisions\/28421"}],"up":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/27517"}],"wp:attachment":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/media?parent=28336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}