OT edge hardware is not a server. It is a PLC controller, a remote gateway, a machine tool with 0.5 CPU cores available for non-production tasks. We designed Impeller for that constraint. The goal was a log processor that could reduce resources requirements to fit the edge reality. HUN-REN SZTAKI benchmark, January 2026: — Impeller: 0.06–0.13 ms CPU per event — Logstash: 0.43–1.73 ms CPU per event On constrained hardware (0.5 core, 500 MB RAM) under high load, Logstash saturates. Impeller does not. Get the report => https://lnkd.in/evUJfpjS #OTSecurity #ICS #SIEM #IndustrialCybersecurity #Logstach #logprocessing
About us
Every factory runs on assumptions. That the PLC installed years ago will keep working. That the old protocol on the wire won’t be noticed. That systems never designed for cybersecurity can somehow remain safe. IT and security teams know the reality. You can’t install agents on legacy machines. You can’t scan aggressively without risking downtime. And shutting down production to “add security” is rarely an option. So protection becomes fragile: perimeter firewalls, static rules, limited visibility, and a lot of hope. Trout takes a different approach. We don’t change your machines. We secure the network around them. Trout wraps each industrial asset in a software-defined security layer that controls access, limits lateral movement, and provides visibility ; without rewiring, re-IPing, or downtime. Your equipment keeps running exactly as it always has. But access is explicit, monitored, and auditable. We built Trout for factories and critical environments where availability matters as much as security. Because protecting industrial systems isn’t about replacing what works. It’s about making what you already rely on safe to operate.
- Website
-
https://www.trout.software/
External link for Trout
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Paris
- Type
- Privately Held
- Founded
- 2022
- Specialties
- networking, cybersecurity, OT, and industrial zero-trust
Products
Locations
-
Primary
Get directions
Paris, FR
-
Get directions
Kingston, New York, US
-
Get directions
Dublin, IE
Employees at Trout
Updates
-
We'll be at Sea-Air-Space in National Harbor next month. Maritime defense networks are some of the hardest environments to secure: disconnected operations, legacy systems, constrained bandwidth, and crews that aren't network engineers. Access Gate was built for this. A single appliance that deploys shipboard or shore-side, provides zero-trust access control, and works without cloud connectivity or specialized IT staff. If you're working on afloat network security, CMMC compliance for maritime programs, or shipboard OT protection, let's set up time at SAS → https://lnkd.in/ecTTcqwe Kiosk #6 in the Carahsoft booth (#415)
-
C'est un honneur d'avoir été sélectionnés pour participer à Inaval 2026. Merci à la DGA de nous offrir l'opportunité de démontrer, grandeur nature, l'innovation que nous apportons à l'écosystème naval de défense. Rendez-vous le 11 juin pour l'action. DGA - Direction générale de l'armement #Marine #Inaval2026
Après le succès des précédentes éditions, i-Naval revient en 2026 pour une nouvelle rencontre dédiée à l’innovation navale de défense. 📝 Au programme : - démonstrations - rencontres entre acteurs de l’écosystème - partage d’expertises et retours d’expérience - valorisation de l’innovation au service des forces armées 📅 Notez dès maintenant la date dans votre agenda ! Plus d’informations à venir très prochainement sur le programme et les modalités d’inscription. DGA - Direction générale de l'armement Marine Nationale Université de Toulon TVT Innovation #Innovation #DGA #Marinenationale #iNaval2026 #UTLN #TVTinnovation #Defense Région Sud - Provence-Alpes-Côte d'Azur Toulon Provence Méditerranée GICAN
-
-
𝐂𝐌𝐌𝐂 𝐍𝐄 𝐒𝐮𝐦𝐦𝐢𝐭 𝐧𝐞𝐱𝐭 𝐰𝐞𝐞𝐤. 𝐑𝐡𝐨𝐝𝐞 𝐈𝐬𝐥𝐚𝐧𝐝, 𝐌𝐚𝐫𝐜𝐡 𝟏𝟏. That CNC mill on your shop floor? It can't run an agent. It's not getting a software update. But it's been making parts for 30 years and it's not going anywhere. Access Gate makes it CMMC-compliant without touching it. One appliance on the network. Access control, segmentation, audit logs. The machine keeps running. Your assessor gets what they need. If you're a defense manufacturer with legacy machines on the floor, an MSP helping DIB clients get compliant, or an RPO/C3PAO looking for a real answer to the shop floor problem — come see it live. Get your stickers → https://lnkd.in/eAKSxwqA To book a meeting with us - https://lnkd.in/e89Uv-px #CMMC #RhodeIsland #DIB
-
-
We’ve joined the PwC Scale Defence & Resilience Tech Programme. Last week in Munich, Trout Software was selected as part of the SDRT cohort, launched alongside the Munich Security Conference. Twenty companies from across Europe were invited to start the programme, focused on strengthening defence and resilience capabilities through deployable technology (out of a curated long list of 500+ 💪). A few moments stood out: • We presented our approach to securing on-premise and industrial infrastructure. These environments still rely too much on implicit trust, yet they run critical operations. • We met industrial and institutional partners looking for solutions that can move quickly from pilot to deployment. This is exactly where Trout operates: delivering practical Zero-Trust for systems that cannot move to the cloud, cannot stop running, and cannot depend on perimeter security. Looking forward to the work ahead with the cohort and partners. Orbint fiveD AUXSYS Alpha Affinity ADA BW Pegasus Aerospace LetsData SATIM Orbotix Skypuzzler HyperAxes SVP @Butterfly @Decisions @Aetos MON5 Peripheral Trout CryptoNext Security Hozint - Horizon Intelligence FOVIAGENX HOLDINGS LIMITED/FOVIATECH Lisann Tandy Giulia Di Mascio @Martina Scarpa Jan Olszaniecki Magda Kwoska Jannis Grube Thierry Calatayut Kristine Berglund Florian Noell Daniele Meini Cesare Battaglia @Steve Kershaw Prof. Dr. Rainer Bernnat Steven De Bruyn Matthieu Lemasson @Piotr Michalzyk
-
-
Trout is attending the Munich Security Conference. If you are in the area, we would be glad to connect. Meet Pablo Quiroga to discuss how Zero-Trust principles can be applied to critical infrastructure and defense environments. We look forward to exchanging perspectives on practical cybersecurity for real-world industrial and mission-critical networks. Reach out to schedule a time to meet.
-
-
We’re excited to announce our partnership with Carahsoft. Through this collaboration, Trout Software technology are now available to the 𝗣𝘂𝗯𝗹𝗶𝗰 𝗦𝗲𝗰𝘁𝗼𝗿 via Carahsoft and its reseller partners ; making it easier for agencies to 𝘀𝗲𝗰𝘂𝗿𝗲 𝗹𝗲𝗴𝗮𝗰𝘆 𝗮𝗻𝗱 𝗼𝗻-𝗽𝗿𝗲𝗺𝗶𝘀𝗲 𝗢𝗧 𝘀𝘆𝘀𝘁𝗲𝗺𝘀 𝘄𝗶𝘁𝗵𝗼𝘂𝘁 𝗱𝗼𝘄𝗻𝘁𝗶𝗺𝗲 𝗼𝗿 𝗲𝗾𝘂𝗶𝗽𝗺𝗲𝗻𝘁 𝗿𝗲𝗽𝗹𝗮𝗰𝗲𝗺𝗲𝗻𝘁. With Trout Access Gate, organizations can apply 𝗭𝗲𝗿𝗼 𝗧𝗿𝘂𝘀𝘁 controls directly in front of critical assets while supporting NIST 800-171 and CMMC objectives. Proud to work alongside Carahsoft, Craig Abod, and Alex Whitworth to help protect critical infrastructure across defense, utilities, manufacturing, and public services. 🔗 https://lnkd.in/e9DmdQ9w #Cybersecurity #ZeroTrust #OTSecurity #CMMC #CriticalInfrastructure #GovTech
-
Navigating the convergence of IT and OT in manufacturing? Discover how microsegmentation can enhance your network security strategy. This tech blog dives into this approach, which isolates environments within your broader network to limit the lateral movement of threats. The article focuses on microsegmentation implementation, network architecture, and the role of IT/OT collaboration. It also discusses different network architectures and their pros and cons, such as the simplicity yet high risk of lateral attacks in a flat network architecture, and the flexibility of SDN which requires a mature IT infrastructure. Dive into the full article for more insights: https://lnkd.in/eTHAGyCJ #CMMC #OTSecurity #Manufacturing #Cybersecurity #ICS #Microsegmentation
-
𝐀𝐜𝐜𝐞𝐬𝐬 𝐆𝐚𝐭𝐞 𝐯25.12 𝐢𝐬 𝐧𝐨𝐰 𝐚𝐯𝐚𝐢𝐥𝐚𝐛𝐥𝐞, delivering simpler and stronger security across IT, OT, and the shop floor. This release focuses on practical visibility, accurate asset inventory, and compliant remote access. Fewer spreadsheets and assumptions, more integrated and real-time controls built for how industrial environments actually operate. What’s new in v25.12 and why it matters: - 𝐍𝐞𝐭𝐰𝐨𝐫𝐤 𝐯𝐢𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲: One-click NetFlow ingestion to reveal assets and traffic patterns on each network. - 𝐀𝐬𝐬𝐞𝐭 𝐝𝐢𝐬𝐜𝐨𝐯𝐞𝐫𝐲 𝐟𝐫𝐨𝐦 𝐥𝐢𝐯𝐞 𝐭𝐫𝐚𝐟𝐟𝐢𝐜: Identify new devices directly from observed traffic and register them in a single action. - 𝐄𝐱𝐩𝐚𝐧𝐝𝐞𝐝 𝐝𝐞𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐫𝐮𝐥𝐞𝐬: Visibility into inter-zone movements, RDP, SSH, and SMB sessions, with clearer insight across IT/OT boundaries. - 𝐎𝐩𝐞𝐫𝐚𝐭𝐨𝐫 𝐚𝐜𝐜𝐞𝐬𝐬 𝐟𝐨𝐫𝐦𝐬: Task-specific, time-limited access instead of permanently open connections, with built-in traceability. - 𝐄𝐧𝐜𝐥𝐚𝐯𝐞 𝐜𝐡𝐚𝐧𝐠𝐞 𝐡𝐢𝐬𝐭𝐨𝐫𝐲: Every change is logged, providing a clear audit trail and simplifying compliance documentation. Get in touch to explore what this release brings to your industrial environment. #IndustrialCybersecurity #OTSecurity #AccessGate #V25.12 Release
-
We are pleased to announce a partnership between Trout and SCOOP Cyber, focused on government and public-sector environments. Together, we bring on-premise cybersecurity capabilities designed for real-world government constraints: legacy systems, sensitive data, and missions where cloud-only models are not an option. The partnership combines Trout’s local, appliance-based security for IT and OT with Scoop Cyber’s expertise in government and regulated programs. The goal is straightforward: help public-sector organizations improve visibility, enforce controlled and traceable access, and meet security and compliance requirements without disrupting existing operations. More to come as we work together on government and critical-mission use cases. Benjamin Levinson Steven Cooperman #Partnership #GovCyber #PublicSector #OTSecurity #IndustrialCybersecurity
-