Insights

OT, ICS, and SCADA

Operational Technology (OT) refers to computing systems that are used to manage industrial operations as opposed to administrative operations. Operational systems include applications such as production line management, mining operations control, oil & gas monitoring, etc.

Industrial control systems (ICS) represent a major segment within the operational technology sector; they comprise systems that are used to monitor and control industrial processes.

Supervisory Control and Data Acquisition (SCADA) systems provide a human-machine interface (HMI) that displays the process under management and provides access to control functions.

Guide
Guide
OT, ICS, and SCADA – What Every Cybersecurity Expert Should Know
In this article you will find out what every cybersecurity expert should know about OT, ICS, and SCADA. Learn more about the interplay and differences.
Learn more
Blog
Blog
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not...
Learn more
Market Compass
Market Compass
Cybersecurity for Industrial Control Systems
Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...
Learn more
Event Recording
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Learn more
Claroty – Visibility into Vulnerability
Whitepaper
Claroty – Visibility into Vulnerability
Organizations are facing a brave new world in which governments are taking a proactive role in constraining cybersecurity risks. Companies with operational infrastructure that is deemed ‘critical’...
OT and IoT Security
Blog
OT and IoT Security
Cybersecurity has traditionally focused on Information Technology (IT) not Operational Technology (OT) for several reasons. First, unlike IT that is used for administrative operations, OT or the...
Stop attackers enjoying a pick ‘n’ mix attack surface
Blog
Stop attackers enjoying a pick ‘n’ mix attack surface
We know that the way forward for business IT is to use multi-hybrid architectures for long term agility of operations. Such architectures will include multiple clouds for new services, on-prem...
Network Detection & Response (NDR)
Leadership Compass
Network Detection & Response (NDR)
This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your needs. We examine...
Protecting OT and ICS
Analyst Chat
Protecting OT and ICS
John Tolbert sits down with Matthias and shares his insights into current approaches for protecting and defending essential enterprise systems beyond traditional, often office-focused...
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Blog
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20...
Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
Webinar Recording
Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
When discussing the matters of industrial cybersecurity with IT experts, lamenting the historical divide between OT and IT seems to be a popular topic: you would often hear that the OT engineers...
Oslo, We Have a Problem!
Blog
Oslo, We Have a Problem!
As you have certainly already heard, Norsk Hydro , one of the world’s largest aluminum manufacturers and the second biggest hydropower producer in Norway, has suffered a massive cyber...
Industrial Control Systems: Understanding the Access Risks and Security Challenges
Webinar Recording
Industrial Control Systems: Understanding the Access Risks and Security Challenges
For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and...
The Crucial Role of Identity in Securing Industrial IoT
Webinar Recording
The Crucial Role of Identity in Securing Industrial IoT
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our...
Sicherheit in den operativen Systemen der Industrie 4.0
Webinar Recording
Sicherheit in den operativen Systemen der Industrie 4.0
Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei...
It’s not about security vs. safety – it is about security and safety
Blog
It’s not about security vs. safety – it is about security and safety
When you’ve ever been involved in discussions between IT Security people and OT (Operational Technology, everything that runs in manufacturing environments) people – the latter not...