Introducing the New EDR-G9010 Series All-in-one Industrial Secure Router

Cybersecurity incidents are on the rise, and industrial control systems are being targeted more than before. In recent incidents where IT systems were compromised, we have noticed that asset owners had no choice but to shut down all systems to avoid further damage spread. With OT and IT converging, it becomes essential to build a robust first line of network defense to secure industrial control systems and infrastructure.

Moxa brings the answer with the EDR-G9010 Series of industry-certified all-in-one firewall/NAT/VPN/switch/routers featuring advanced security and high performance to safeguard your industrial applications.


Build Defense-in-depth Security for Your Industrial Networks

Network Segmentation

Flat network designs originally intended to ensure low-latency data communication and to maintain the availability of all systems are now a key security concern in OT networks. It is important to perform proper network segmentation to minimize risk without compromising performance.



To protect critical assets, you need:

• Industrial Intrusion Prevention System (IPS)
• Virtual patch
• Hardware bypass

Check our IEC-G102-BP IPS device!



To build a security boundary, you need:

• High bandwidth
• Redundancy mechanisms
• Deep Packet Inspection (DPI) for industrial

Check our EDR-G9010 secure router!


Secure Remote Access

Remote connections have become an essential part of industrial communications. However, despite the convenience of remote desktop protocols, connection security is often being overlooked. It is important to build secure remote access channels to strengthen edge security while ensuring stable connection throughput.


Network Address Translation (NAT)

Consider IP addresses a gateway to your critical assets. To protect internal assets, all devices need a private IP address that communicates through a single public IP address. However, managing IP addresses can be a daunting task. In addition, the public IP address is exposed to possible malicious actors. Therefore, it is imperative to have a mechanism to manage the IP addresses of your critical assets more efficiently.

Suitable for Various Industrial Applications




* required field