Cloudflare Authorised Service Delivery Partner (ASDP)

IT/OT Convergence Security with Cloudflare

IT and OT networks were never designed to be connected. Now they are. MES platforms pull data from PLCs. Engineers VPN into SCADA systems from hotel Wi-Fi. ERP integrations reach the factory floor. Each of these connections can be used to reach production systems. Brixio deploys Cloudflare to secure the boundary between IT and OT, without touching your operational technology.

  • Cloudflare ASDP certified
  • ISO 27001:2022
  • 400+ security projects delivered
  • Follow-the-Sun 24/7 across EMEA and APAC
IT ZONE ERP MES Workstations Vendor laptops OT ZONE SCADA PLCs HMI / DCS Historian CLOUDFLARE IT/OT boundary Magic WAN IT/OT segmentation Zero Trust Access replaces VPN Gateway DNS filtering IEC 62443 ZONES & CONDUITS
26%
Manufacturing targeted
Manufacturing is the most attacked industry for the third consecutive year (IBM X-Force, 2025).
70%
OT organisations breached
70% of OT organisations experienced at least one intrusion in 2024 (Fortinet State of OT Security).
$1.9M
Cost per day of downtime
Average ransomware-induced downtime cost in manufacturing (Sophos, 2025).
400+
Brixio Cloudflare projects
Deployments across regulated industries in EMEA and the GCC.
In production with

Trusted by industrial and infrastructure operators running Cloudflare with Brixio.

bticino
Chryso
Valobat
Abu Dhabi Airports
Thales
WeeeDoIT
MOI
Postee
The convergence problem

The IT/OT separation that defended industrial sites no longer exists.

For decades IT and OT operated in two worlds, separated by air gaps, VLANs and firewalls. Four forces dissolved that boundary.
01

MES and ERP bridge IT and OT

Manufacturing Execution Systems read directly from PLCs and write to ERP. The integration creates a permanent data path between corporate IT and the production floor.

  • MES read PLC tags in real time
  • ERP integration loops back to controllers
  • A single compromised workstation reaches the line
02

Remote access reaches OT from anywhere

Engineers, vendors and contractors connect to SCADA, HMI and DCS from corporate offices, home networks and third-party sites. Legacy VPN grants network-wide access.

  • VPN sprawl across vendors and contractors
  • Hotel Wi-Fi sessions on industrial controls
  • Once inside, lateral movement is unrestricted
03

IIoT sensors multiply endpoints

Industrial IoT sensors stream telemetry from production equipment to cloud analytics. Each connected sensor and each edge gateway is an entry point the legacy perimeter was never built to govern.

  • Edge gateways bridge OT to cloud
  • Telemetry channels are bidirectional
  • Endpoint count outgrows traditional firewalls
04

Cloud SCADA and historians move OT data out

Cloud-based SCADA and historian platforms move operational data outside the traditional OT perimeter for centralised monitoring across plants. The perimeter dissolves at the cloud connector.

  • Cloud historians replicate production data
  • Centralised SCADA spans plants and regions
  • Cloud connectors become the new boundary
OT monitoring tools show what happens inside the OT network. Securing the network that connects IT to OT is a separate problem, and it comes first.
Geoffroy Morgan de Rivery
CEO, Brixio
BrixioOne
What we deploy

Five Cloudflare capabilities scoped to the IT/OT boundary.

Brixio deploys Cloudflare on the IT side of the boundary and on OT-adjacent networks. We do not deploy into PLCs, SCADA or safety instrumented systems.

01 · Segmentation

Stop lateral movement from corporate IT to the production floor.

Policy-based segmentation between IT and OT networks without legacy MPLS or site-to-site VPN. Centralised firewall policies enforced at the edge across every plant, warehouse and office. Micro-segmentation aligned with IEC 62443 zone and conduit principles.

  • Policy-based IT/OT segmentation
  • Centralised firewall policies across all sites
  • IEC 62443 zone and conduit alignment
  • No traffic backhauling, edge-enforced policies
  • Anycast IPsec / GRE for plant connectivity

Want to see this on your environment?

We start every engagement with a free OT security assessment: boundary cartography, exposure review, deployment options scoped to your sites and your regulatory frame.

Scope of the engagement

Brixio secures the network boundary. Your OT team keeps the process control layer.

The distinction matters. OT-native monitoring (Claroty, Dragos, Nozomi, TxOne) detects anomalies inside the OT network. Cloudflare prevents threats from reaching it. The two stacks are complementary, not competing.
01

What Brixio secures

The IT side of the boundary, plus OT-adjacent networks where corporate IT meets production technology.

  • Network segmentation between IT and OT (Magic WAN)
  • Remote access to OT systems (Zero Trust Access)
  • DNS filtering on OT-adjacent networks (Gateway)
  • DDoS protection for exposed OT interfaces (Magic Transit)
  • Web application protection for MES, historian, HMI portals (WAF)
02

What Brixio does not touch

Anything that runs the industrial process. Production uptime is non-negotiable, change management is strict, and OT teams own these layers.

  • PLC programming and configuration
  • SCADA monitoring (Claroty, Dragos, Nozomi, TxOne)
  • Industrial process control logic
  • Safety Instrumented Systems (SIS)
  • Firmware patching on industrial controllers
03

How we work with OT teams

IT-side first. Then progressive extension to OT-adjacent networks. Always under industrial change management.

  • IT-side controls deployed first, no OT impact
  • Progressive extension under change windows
  • OT team owns process control decisions
  • Joint runbooks for incidents that cross the boundary
04

Where compliance fits

Most engagements start with a regulator deadline: NIS2, IEC 62443, NESA, TISAX. Configurations are documented for audit defensibility.

  • NIS2 articles 21 and 23 mapping
  • IEC 62443 zone and conduit documentation
  • NESA, TISAX, DORA cross-mapping where relevant
  • Audit-ready evidence package on handover
Where IT/OT convergence applies

Five sectors where connected operations meet regulated controls.

IT/OT convergence is not limited to manufacturing. Any industry that operates physical infrastructure controlled by industrial systems faces the same boundary problem.

Compliance

OT cybersecurity is no longer voluntary. Regulators codified what to deploy.

Regulators across the EU, Middle East and Asia-Pacific are mandating cybersecurity controls for industrial operations. Brixio maps each requirement to a Cloudflare configuration and documents every decision for audit readiness.

NIS2

EUIn force

Essential and important entities in critical sectors

Risk management, network segmentation, incident detection, supply chain security

CloudflareMagic WAN (segmentation), Zero Trust Access, Gateway, security event logging

IEC 62443

GLOBALReference standard

Industrial automation and control systems

Zone and conduit model, access control, system integrity, network segmentation

CloudflareMagic WAN (zone segmentation), Zero Trust Access, Gateway DNS filtering

NESA

UAEIn force

Critical infrastructure operators in the UAE

Critical infrastructure protection, access control, incident response

CloudflareZero Trust Access, WAF, DDoS protection, audit logging

Malaysia CSA 2024

GLOBALIn force

NCII operators in Malaysia

NCII risk assessments, biennial audits, incident notification

CloudflareWAF, Zero Trust Access, security event logging, Magic WAN

TISAX

EUSector requirement (automotive)

Automotive supply chain (OEMs and suppliers)

Information security, prototype protection, secure data exchange

CloudflareZero Trust Access, DLP, WAF, audit logging

CyberSecurity Act (Singapore)

GLOBALIn force

Critical Information Infrastructure (CII) operators

Critical information infrastructure, risk management, audits

CloudflareFull Cloudflare security stack

Cross-mappings available on request. Engagements typically combine NIS2 (EU) and IEC 62443 (process layer) for European deployments.

Deployment approach

A phased model designed for environments where production uptime is non-negotiable.

IT-side controls first. OT-adjacent extension under change windows. Never inside the process control layer.

OT security assessment

We map the IT/OT boundary end-to-end. Every connection point between corporate IT and production networks, every remote access pattern, every existing segmentation control.

→ A shared, fact-based picture of the boundary, ready to drive scoping.

Architecture design

Cloudflare deployment designed around IEC 62443. Zones and conduits per site, segmentation policies, access rules, DNS filtering configurations. Each zone has a documented rollback path; the access matrix is mapped per role and per system.

→ A target architecture validated before any change touches production.

IT-side deployment

Magic WAN, Zero Trust Access and Gateway, on the IT side first. Connectors land on corporate edges. Remote access flows are governed for engineers, vendors and contractors.

→ No changes to OT systems at this stage.

OT-adjacent extension

Segmentation and DNS filtering extend to OT-adjacent networks. Under industrial change management, with windows aligned on production cycles. Each zone enables with a documented rollback path; validation runs in parallel with the OT team.

→ Full IT/OT segmentation in production, no deployment directly into PLCs or SCADA.

Documentation and handover

Audit-ready evidence, handed over. Configuration documentation, compliance cross-mapping (NIS2, IEC 62443, TISAX as applicable), runbooks for OT-aware incidents.

→ Knowledge transfer to internal teams. Every choice is traceable for regulator review.

Ongoing operations (optional)

Continue with managed services, support plans or emergency response. Continuous governance, reactive operations or incident response. Your choice.

→ The Cloudflare tenant stays under your ownership at every stage.

Need a compliance mapping for your specific environment?

We map your IT/OT estate to NIS2, IEC 62443, NESA or TISAX requirements and document each Cloudflare configuration choice for audit defensibility.

Why Brixio

Why industrial security teams pick Brixio for IT/OT convergence.

Six reasons that come up across every manufacturing, energy and infrastructure engagement.

IT/OT boundary expertise

A dedicated IT/OT Convergence Security practice. We understand the constraints: production uptime is non-negotiable, change management is strict, and OT teams do not trust IT vendors who claim to "secure OT".

100% Cloudflare

A single platform for segmentation, access control, DNS filtering, DDoS protection and WAF, instead of stitching together separate tools from separate vendors.

ASDP certified

Direct escalation to Cloudflare engineering. Documented, auditable delivery process aligned with NIS2 and IEC 62443 requirements.

Multi-site deployment

Manufacturing groups and energy companies operate across dozens of plants. Brixio designs architectures that scale across sites with consistent policies from a single control plane.

OT-aware, not OT-intrusive

We deploy IT-side controls and extend progressively. We never deploy directly into PLCs, SCADA systems or safety instrumented systems.

Follow-the-Sun 24/7

Engineers in Luxembourg, Paris, Dubai and Singapore. Industrial threats do not follow business hours.

FAQ

IT/OT convergence security: frequently asked questions

IT/OT convergence is the integration of information technology networks (corporate email, ERP, business applications) with operational technology networks (PLCs, SCADA, industrial control systems). It enables real-time data exchange, remote monitoring and cloud analytics, and creates new attack paths from corporate IT to production systems.

Magic WAN provides policy-based segmentation between corporate IT and OT networks. Unlike legacy MPLS or VLAN approaches, Magic WAN enforces segmentation at the edge with centralised policies that apply across every site, aligned with IEC 62443 zone and conduit principles.

No. Brixio secures the network boundary between IT and OT. We deploy Magic WAN, Zero Trust Access and Gateway on the IT side and on OT-adjacent networks. We do not touch PLCs, SCADA, safety instrumented systems or industrial process control logic. Our approach complements OT-native monitoring (Claroty, Dragos, Nozomi, TxOne).

Yes. Zero Trust Access replaces VPN with identity- and context-aware access to specific systems. Engineers, vendors and contractors reach only the systems they need (MES, historian, HMI portals) without network-level access. Every session is logged for audit and compliance.

Manufacturing (automotive, aerospace, FMCG, industrial equipment), energy and utilities (power generation, transmission, distribution, oil and gas), healthcare (connected medical devices, building management) and transportation. Any industry that operates physical infrastructure controlled by industrial systems.

NIS2 requires network segmentation, access control, incident detection and supply chain security for entities in critical sectors. The Cloudflare stack (Magic WAN, Zero Trust, Gateway) maps directly to NIS2 articles 21 and 23. See the NIS2 compliance page for the full mapping.

IT-side controls (WAF, Zero Trust for remote access, supply chain portal protection) deploy in 4 to 8 weeks. IT/OT segmentation with Magic WAN across multiple plants takes 8 to 16 weeks. Every engagement starts with an OT security assessment.

Get started

Secure the boundary between IT and OT

Your production networks are connected to your corporate IT. The question is whether that connection is governed, segmented and auditable, or whether it is an open path for lateral movement. Brixio deploys Cloudflare on the IT side of that boundary, following industrial change management rules and without touching your process control systems.

Trusted and certified
  • ASDPAuthorized Service Delivery Partner
  • ISO27001:2022 certified
  • IEC62443 zone-aligned engagements
Talk to an expert

IT and OT, talking properly. One perimeter, zero blind spots.

Tell us where you are with this solution. A Brixio engineer comes back to you with a clear next step — workshop, free assessment, or scoping call.

  1. You send a short messageTwo minutes, no qualification questionnaire.
    ≤ 5 min
  2. An engineer reads itWe pick the right next step based on your context and the solution(s) you flagged.
    ≤ 4 hours
  3. Callback scheduledA 30-min call with a certified Cloudflare engineer.
    ≤ 24 hours
  4. Engagement startsWorkshop, free assessment, scoping call — whichever fits your situation.
    Day 1+
We help scope the right next step.You decide whether to engage. ISO 27001:2022.
Step 01 · Send your message

Tell us a bit, get a callback.

Other Cloudflare solutions you're exploring (optional)

By submitting, you accept that a Brixio engineer will reach out. No newsletter, no spam. ISO 27001:2022.