SSenStone Secures K-water with First OT Endpoint Authentication for Critical Infrastructure
SSenStone, a leading authentication security provider, announced that its OTAC (One-Time Authentication Code) technology is being implemented by Korea Water Resources Corporation (K-water) to strengthen security for water facility control systems. This represents the first real-world application of IEC 62443-compliant Identification and Authentication Control in critical infrastructure.
The project delivers the OTAC Trusted Access Gateway (TAG), a dynamic one-time code authentication solution that protects PLCs, HMIs, RTUs, DCS, and SCADA endpoints without requiring legacy device replacement. By generating unique offline authentication codes via pre-registered media such as smartphones or display cards, TAG blocks unauthorized access at the source and creates secure audit logs for compliance.
Amid growing cyberattacks on water facilities worldwide — including recent incidents in Norway and Poland — this project demonstrates how proactive endpoint authentication can eliminate vulnerabilities in fixed-password systems and prevent unauthorized manipulation of critical infrastructure.
The initiative also aligns with national security guidelines in Korea and sets a reference model for global critical infrastructure operators. swIDch, SSenStone’s global headquarters in London, will play a key role in scaling this technology to international markets.
Chang-Hun Yoo, CEO of SSenStone and swIDch, said: “Recent attacks on water facilities in Europe remind us that OT endpoint security is no longer optional. This collaboration with K-water represents a significant step toward securing critical national infrastructure, and we are committed to bringing our trusted technology to safeguard essential systems worldwide.”
Information contained on this page is provided by an independent third-party content provider. XPRMedia and this Site make no warranties or representations in connection therewith. If you are affiliated with this page and would like it removed please contact [email protected]