Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks. Things have changed dramatically in the recent years: since 2000s, many control systems have switched to commodity hardware and standard networking protocols. The convenience of remote management and monitoring has led to industrial networks becoming increasingly interconnected with corporate IT infrastructures. Also, the growing demand for collecting and analyzing vast amounts of data from sensors and controllers is fueling the growth of the Industrial IoT, which is to a large extent built on low-power computing devices directly connected to the Internet.
Such unprotected ICS and IIoT systems are no longer limited to manufacturing companies or utilities and in fact can now be found across all vertical sectors, including financial services, and cybercriminals are already learning to use them as gateways into corporate IT infrastructures. Unfortunately, people charged with management of those systems still have little or no knowledge of IT security. There is definitely a deficit of security responsibility in this crucial area, further complicated by the traditionally slow upgrade cycles in OT infrastructures, where hardware is expected to remain in service for over 10 years. This webinar analyzes the risks of unprotected industrial networks, the impact of IIoT applications on control systems and how organizations can successfully manage these risks through effective identity and access management.
Language: English • Duration: 45:52 • Resolution: 1280x720
ARCON PAM SaaS
The Role of APIs for Business
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity