Insights

OT, ICS, and SCADA

Operational Technology (OT) refers to computing systems that are used to manage industrial operations as opposed to administrative operations. Operational systems include applications such as production line management, mining operations control, oil & gas monitoring, etc.

Industrial control systems (ICS) represent a major segment within the operational technology sector; they comprise systems that are used to monitor and control industrial processes.

Supervisory Control and Data Acquisition (SCADA) systems provide a human-machine interface (HMI) that displays the process under management and provides access to control functions.

Guide
Guide
OT, ICS, and SCADA – What Every Cybersecurity Expert Should Know
In this article you will find out what every cybersecurity expert should know about OT, ICS, and SCADA. Learn more about the interplay and differences.
Learn more
Blog
Blog
OT and IoT Security
Cybersecurity has traditionally focused on Information Technology (IT) not Operational Technology (OT) for several reasons. First, unlike IT that is used for administrative operations, OT or the...
Learn more
Whitepaper
Whitepaper
Claroty – Visibility into Vulnerability
Organizations are facing a brave new world in which governments are taking a proactive role in constraining cybersecurity risks. Companies with operational infrastructure that is deemed ‘critical’...
Learn more
Event Recording
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e.,...
Learn more
The Evolution of Secure Access in Critical Infrastructure
Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential...
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e.,...
Strategic Approaches to Secure Industrial Control System Environments
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
 
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
How to protect your OT and IoT from Cybersecurity Threats
Analyst Chat
How to protect your OT and IoT from Cybersecurity Threats
Graham Williamson has teamed up with John Tolbert to research the current state of the Operational Technology (OT) and Industrial Control Systems (ICS) sectors. They documented the ability of the...
The Machine Monitoring Mandate
Webinar Recording
The Machine Monitoring Mandate
Governments world-wide are increasingly worried about the social unrest that could result from a cybersecurity compromise of critical infrastructure. This has highlighted the fact that the...
Protecting OT and ICS
Analyst Chat
Protecting OT and ICS
John Tolbert sits down with Matthias and shares his insights into current approaches for protecting and defending essential enterprise systems beyond traditional, often office-focused...
Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
Webinar Recording
Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
When discussing the matters of industrial cybersecurity with IT experts, lamenting the historical divide between OT and IT seems to be a popular topic: you would often hear that the OT engineers...
Industrial Control Systems: Understanding the Access Risks and Security Challenges
Webinar Recording
Industrial Control Systems: Understanding the Access Risks and Security Challenges
For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and...
The Crucial Role of Identity in Securing Industrial IoT
Webinar Recording
The Crucial Role of Identity in Securing Industrial IoT
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our...
Sicherheit in den operativen Systemen der Industrie 4.0
Webinar Recording
Sicherheit in den operativen Systemen der Industrie 4.0
Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei...
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
Event Recording
Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?
In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have...
1 2 Next