Insights

OT, ICS, and SCADA

Operational Technology (OT) refers to computing systems that are used to manage industrial operations as opposed to administrative operations. Operational systems include applications such as production line management, mining operations control, oil & gas monitoring, etc.

Industrial control systems (ICS) represent a major segment within the operational technology sector; they comprise systems that are used to monitor and control industrial processes.

Supervisory Control and Data Acquisition (SCADA) systems provide a human-machine interface (HMI) that displays the process under management and provides access to control functions.

Guide
Guide
OT, ICS, and SCADA – What Every Cybersecurity Expert Should Know
In this article you will find out what every cybersecurity expert should know about OT, ICS, and SCADA. Learn more about the interplay and differences.
Learn more
Blog
Blog
Security for Operational Technology Environments
Learn now about the similar and unique threats facing operational technology (OT) compared to traditional enterprise IT systems.
Learn more
Leadership Compass
Leadership Compass
Network Detection & Response (NDR)
This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your needs. We examine...
Learn more
Event Recording
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e.,...
Learn more
The Evolution of Secure Access in Critical Infrastructure
Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential...
Who is Responsible for Operational Technology Security?
Blog
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not...
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e.,...
Strategic Approaches to Secure Industrial Control System Environments
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
 
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Security for Operational Technology Environments
Blog
Security for Operational Technology Environments
Learn now about the similar and unique threats facing operational technology (OT) compared to traditional enterprise IT systems.
Advanced IT security solutions for OT environments
Leadership Brief
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems...
Analyst Chat #131: How to protect your OT and IoT from Cybersecurity Threats
Analyst Chat
Analyst Chat #131: How to protect your OT and IoT from Cybersecurity Threats
Graham Williamson has teamed up with John Tolbert to research the current state of the Operational Technology (OT) and Industrial Control Systems (ICS) sectors. They documented the ability of the...
Cybersecurity for Industrial Control Systems
Market Compass
Cybersecurity for Industrial Control Systems
Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...
The Machine Monitoring Mandate
Webinar Recording
The Machine Monitoring Mandate
Governments world-wide are increasingly worried about the social unrest that could result from a cybersecurity compromise of critical infrastructure. This has highlighted the fact that the...
CrashOverRide or the Need for Putting OT Security at the Center of Attention
Blog
CrashOverRide or the Need for Putting OT Security at the Center of Attention
One of the deplorable components of the Russian aggression toward Ukraine has been resumption of cyber-attacks on the electrical grid. This has highlighted the vulnerability of the electrical...
Claroty – Visibility into Vulnerability
Whitepaper
Claroty – Visibility into Vulnerability
Organizations are facing a brave new world in which governments are taking a proactive role in constraining cybersecurity risks. Companies with operational infrastructure that is deemed ‘critical’...
1 2 3 4 Next