Securing an agri-food site: deployment of a workstation seal with TXOne Stellar Protect

Securing an agri-food site: deployment of a workstation seal with TXOne Stellar Protect

November 13th, 2025Cybersecurity5 minutes
Linkedin

Faced with new cyber challenges, an agri-food manufacturer north of Paris is strengthening the security of its critical workstations with TXOne Stellar Protect sealing, deployed by our DATIVE Cybersecurity experts.

A food industry company north of Paris faces new cyber challenges and calls on our teams

In a context where industrial cybersecurity is becoming a key pillar of operational performance, a major player in the food industry located north of Paris has sought our expertise to strengthen the protection of its critical production workstations.


This site, made up of several automated production lines, operates continuously to meet particularly strict production and quality requirements. Within this organization, certain computer stations integrated into the SERA machines (a subsidiary of the Gérard Perrier Industrie Group, of which we are also part) play a strategic role in the production chain. Their availability and integrity directly determine business continuity.


As part of a project carried out with SERA, a subsidiary of the GPI Group, we intervened with a clear objective: to secure these critical workstations to reduce the risk of alteration and strengthen OT resilience.

Food Industry

A common issue in the industry: How to protect OT processes without disrupting food production lines?

OT (Operational Technology) environments in the food industry often face a delicate balance: how to strengthen the security of industrial systems without affecting production or the stability of the equipment?


Before our intervention, the production stations, although operational, were still exposed to several risks:

  • Unauthorized modifications of configurations or software,
  • Risk of human error during maintenance or technical interventions,
  • Lack of integrity control on certain system components,
  • Vulnerability to the introduction of external devices (USB keys, mobile media, etc.)

These weaknesses could, if exploited, lead to production downtime or even impact the quality of finished products. The technical management and maintenance teams therefore wanted an effective, stable, and transparent hardening solution, adapted to their industrial constraints, without adding complexity for operators.

Are you also facing cybersecurity challenges in your industrial process? Contact us

Contact
Experts working in an electrical cabinet

A collaborative approach with our agri-food client's teams and SERA's automation engineers

From the very start of the project, our discussions with our client's technical contacts and the SERA teams (project manager, automation engineer) made it possible to precisely define the scope of intervention and operational requirements.


Our approach was structured around three priorities:

  • 1. Secure critical workstations without disrupting their operation.
  • 2. Ensure full compatibility with existing industrial applications.
  • 3. Enable simple and centralized supervision for local teams.

This joint approach made it possible to integrate cybersecurity as a factor of industrial reliability, rather than as an additional constraint.

Our intervention: workstation sealing with TXOne Stellar Protect

The intervention was carried out in pairs by our DATIVE Cybersecurity experts, on-site, in an active production environment.


Each workstation was first analyzed and validated during the preparatory phase to ensure full compatibility with the chosen solution: TXOne Stellar Protect.

A solution designed for OT environments

TXOne Stellar Protect is a protection technology specifically designed for industrial environments.


Unlike traditional IT antivirus or security solutions, it operates based on an adaptive whitelisting and system sealing principle, ensuring strong security without interfering with operational processes.


Its main features include:

  • System lock after validated configuration: no unauthorized modification is possible
  • Control of executables and processes allowed to run on the machine
  • Blocking of unapproved devices (USB ports, external media, etc.)
  • Monitoring and detection of abnormal behavior, even without an Internet connection
  • Compliance with industrial security standards such as IEC 62443 and the NIS2 directive

This technology ensures effective hardening of OT workstations while remaining compatible with the availability and performance constraints specific to industrial environments.

Experts in front of a white station

Solution deployment methodology

Our intervention followed a rigorous process, adapted to the site’s context:

  • Audit and validation of existing configurations on SERA workstations,
  • Installation and configuration of TXOne Stellar Protect,
  • Sealing phase, with locking of critical settings and operational testing,
  • Final validation with local teams,
  • Knowledge transfer to ensure understanding and autonomous maintenance of the system.

The entire deployment was carried out without any production interruption, demonstrating the ability to integrate cybersecurity at the core of industrial operations.

Results: enhanced security at this site specialized in the agri-food industry

The benefits for the client were immediate:

  • Critical workstations secured against any accidental or malicious alteration,
  • Significant reduction in the risk of production system downtime,
  • Increased peace of mind for local teams, confident in the stability of their OT environments,
  • Enhanced compliance with normative and regulatory requirements (IEC 62443, NIS2).

Thanks to this approach, the site now benefits from a consistent and long-lasting level of protection on SERA production workstations.


This action is part of a broader industrial cyber-resilience strategy, where security becomes a pillar of operational performance.

Would you like to protect your food production process? Contact us

Contact

Towards a more resilient and secure food industry

Workstation sealing is a key step in hardening industrial environments. Combined with a network segmentation policy, OT supervision, and secure access management, it contributes to an effective and sustainable defense-in-depth strategy.


For players in the food industry, faced with increasing digitalization and continuous production requirements, this type of action represents a strategic investment in security, compliance, and long-term operational sustainability.


If, like this industrial company, you want to strengthen the security of your production workstations through OT sealing or hardening, our teams can support you at every stage of your journey.

Contact our industrial cybersecurity experts

Contact
News

News

Defense in depth: a nuclear safety principle that has become a pillar of industrial cybersecurity
Cybersécurity
Defense in depth: a nuclear safety principle that has become a pillar of industrial cybersecurity

Developed in the field of nuclear safety to prevent major accidents, defense in depth is now a fundamental concept in industrial cybersecurity. It is based on the idea of successive layers of protection, applied to critical environments, to ensure resilience, security, and business continuity.

Know more
The Zero Trust Model: An Essential Strategy in OT Cybersecurity
Cybersécurity
The Zero Trust Model: An Essential Strategy in OT Cybersecurity

The Zero Trust model has become a key cybersecurity strategy for OT. This article presents its principles, its benefits for industrial cybersecurity, and the key steps to deploy a Zero Trust architecture adapted to OT network security.

Know more
7 Techniques and Strategies to Adopt in Industrial Cybersecurity
Cybersécurity
7 Techniques and Strategies to Adopt in Industrial Cybersecurity

Industrial cybersecurity has become a major strategic issue today. The rise of IIoT is multiplying the number of connected devices in your industrial environments. At the same time, IT/OT convergence is blurring the boundaries between office and industrial systems. Many devices, often obsolete, remain difficult to secure effectively. As a result, the attack surface of your production environments keeps expanding. Cyber threats are no longer limited to your office systems. They now target your production lines and critical infrastructures as well. Business continuity is directly at risk. A successful attack can halt your production and cause major financial losses for your company. It can also endanger the safety of your production teams, particularly your operators. Your reputation may be damaged, especially in the event of negative media coverage following an attack. In some cases, even national security is at stake, particularly if you are among the operators of vital importance (food, water, energy, …). Faced with these risks, adopting a proactive posture is essential for the sustainability and sovereignty of your industry. This approach protects industrial assets and reduces operational risks. It also ensures the resilience of systems against attacks. This article presents seven key strategies to sustainably strengthen industrial cybersecurity.

Know more
DATIVE in La Jaune et la Rouge: a recognition of our commitment to industrial cybersecurity
Cybersécurity
DATIVE in La Jaune et la Rouge: a recognition of our commitment to industrial cybersecurity

We are proud to have been recently featured in the magazine Le Jaune et la Rouge, a flagship publication of the Polytechnique alumni community. This article highlights our expertise in industrial cybersecurity within the Gérard Perrier Industrie Group (GPI) and our practical, field-based approach. This recognition reinforces our belief: securing OT is now a strategic priority for French industrial players.

Know more
Industrial cyber security: identifying critical vulnerabilities in your infrastructure
Cybersécurity
Industrial cyber security: identifying critical vulnerabilities in your infrastructure

In 2024, the industrial sector accounted for 29% of ransomware attacks worldwide. A statistic that illustrates the extent to which connected factories have become prime targets for cybercriminals. Whether opportunistic actors, organised groups or state threats, all are now exploiting technical and human vulnerabilities within industrial environments. Identifying and correcting vulnerabilities has therefore become a strategic priority.

Know more