ESGI completes the CEO search for Veracity, an Option3 Private Equity company

November 1, 2022

Veracity Industrial Networks   ( VIN ) was established in 2015.

The company developed a leading edge technology  Net-Optix™, the revolutionary product simplifying and streamlining the process of maintaining and securing industrial operational networks. This is referred to as Zero-Trust Security Level Model. Dr. Peter Fonash, CTO at VIN is a thought leader in this field. He is an expert on industrial control networks, cyber physical systems and the future of operational technology.

No device on your network can communicate to another without your explicit permission. You create device to device communication rules that Net-Optix propagates to the switches and centrally manages Continuously up to date network information about devices, switches, bandwidth usage. Unknown traffic blocked and flagged for you.


Because Net-Optix, your network is Self-Healing, centrally manages the network and traffic by device and not by switch.

Veracity’s approach to traffic engineering allows complexity at scale while allowing fine-grained control. The user can manage traffic at an elevated level – e.g. what zone to zone communications are permitted – or via very granular rules such as “a specific PLC is allowed to communicate with a specific HMI over DNP-3.”

Net-Optix is designed by OT network experts for OT network users.  You don’t think of your plant in terms of VLANs and subnets.  You care that this PLC can get data to that HMI.  Manage your network the way you think. We call this Visual Network Management

In addition to simplified traffic engineering via zones and device types, Veracity provides dynamic, API-based control by allowing configuration change sets to be grouped as policies. These policies can be enabled or disabled at any time, vastly simplifying operational workflows. The system will support both a default policy of denying that access alongside an operational policy of allowing that access and switching between them can be done via a remote process driven by a change management workflow or via a few clicks in the user interface.