Extend IT security to OT networks and devices
Just think about it…
- Most of today’s OT networks consist of legacy equipment originally designed to be safeguarded from unsecured networks by perimeter protection such as firewalls.
- But firewalls offer little or no protection against attacks (such as malware on removable devices) originating within the OT network itself.
- Many traditional security tools cannot be applied to an OT environment, can actually harm the devices that control plant equipment, and even using them for scanning can cause major plant disruption.