• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      68 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Application Integration Platforms
      • Code Modernization Tools
      • Event Brokers
      • Virtual Reality Development Software
      • Digital Twin of an Organization Platforms
      • Green Software Engineering
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • AI Agent Development Platforms for Software Engineering
      • Load Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Value Stream Management Platforms
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
CPS Protection Platforms

CPS Protection Platforms Reviews and Ratings

What are CPS Protection Platforms?

Gartner defines cyber-physical systems (CPS) protection platforms as products that discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT. They do so by analyzing or interacting with industrial/industry-specific protocols and operational network traffic. They understand physical process asset behavior and do not interfere with CPS operations. They can be delivered from the cloud, on-premises or in a hybrid form.

Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Tenable OT Security
Tenable OT Security
Logo of ICSFusion Platform
ICSFusion Platform
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
For 50M-1B USD Companies
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
Logo of Tenable OT Security
Tenable OT Security
Logo of ICSFusion Platform
ICSFusion Platform
For North America
Logo of The Claroty Platform
The Claroty Platform
Logo of Nozomi Networks Platform
Nozomi Networks Platform
Logo of Darktrace / OT
Darktrace / OT
Integration & Deployment
Logo of ICSFusion Platform
ICSFusion Platform
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
Logo of Nozomi Networks Platform
Nozomi Networks Platform

Product Listings

Filter by

Products 1 - 20 of 112
Sort by
Logo of The Claroty Platform

The Claroty Platform

By Claroty

4.8
(305 Ratings)

Claroty provides a cyber-physical systems protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership.

Show More Details
Logo of Nozomi Networks Platform

Nozomi Networks Platform

By Nozomi Networks

4.9
(250 Ratings)
customers choice 2025

Nozomi Networks Platform is a software designed for operational technology and industrial control system security. It provides visibility, monitoring, and threat detection for critical infrastructure and automated industrial environments. The software collects and analyzes data from operational networks to identify vulnerabilities and suspicious activity, helping organizations maintain the reliability and safety of their industrial systems. It integrates with asset management and security operations workflows to support incident response and risk management. The software addresses the business need for continuous monitoring and protection of industrial assets and processes, helping organizations manage cyber and operational risks across geographically distributed sites.

Show More Details
Logo of Darktrace / OT

Darktrace / OT

By Darktrace

4.7
(152 Ratings)

Darktrace / OT is a software designed to provide cyber threat detection and response for operational technology environments. It applies self-learning artificial intelligence to monitor network traffic across industrial control systems and critical infrastructure. The software identifies anomalies and potential threats in real-time by analyzing behavioral patterns without relying on prior knowledge of attack methods. It supports visibility across both IT and OT networks, helping organizations respond to incidents and maintain uptime. Darktrace / OT addresses the challenge of securing complex operational systems where traditional security tools may lack effectiveness due to proprietary protocols and legacy technologies.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.7
(119 Ratings)

Armis Centrix for OT/IoT Security is a cyber exposure management and security solution designed for organizations operating in converged IT and OT environments or those seeking cloud-based and/or on-premises protection for operational technology (OT) and Internet of Things (IoT) assets. It provides visibility, risk assessment, and threat mitigation capabilities across industrial, critical infrastructure, and enterprise environments that may be airgapped, converged or a combination of both. The solution includes policy enforcement, anomaly detection, and behavior analysis features that support early threat identification and help reduce cyber risks and operational disruptions. It integrates with existing security architectures to support resilience, streamline compliance processes, and enable real-time security management at scale.

Show More Details
Logo of Dragos Platform

Dragos Platform

By Dragos

4.5
(104 Ratings)

Dragos Platform is a software designed to provide cybersecurity solutions for industrial control systems and operational technology environments. The software features asset identification, threat detection, incident response, and vulnerability management capabilities. It enables organizations to monitor networks, analyze data for potential risks, and respond to security events within industrial infrastructures. The software addresses business challenges related to safeguarding operational systems from cyber threats, improving visibility into network activity, and supporting compliance with regulatory requirements. It assists organizations in managing and mitigating risks associated with industrial environments while helping maintain operational reliability and security.

Show More Details
Logo of Fortinet OT Security Platform

Fortinet OT Security Platform

By Fortinet

5
(95 Ratings)

Fortinet OT Security Platform is software designed to safeguard operational technology environments by integrating network security, visibility, and control across industrial systems. The software addresses the need for secure connectivity within critical infrastructure by providing threat detection, asset visibility, and risk management capabilities. It offers centralized management for securing converged IT and OT networks and features specialized controls for industrial protocols and legacy assets often found in industrial networks. The software assists organizations in monitoring and enforcing security policies, segmenting networks, and responding to potential cyber threats within operational technology environments, thereby supporting the continuity and reliability of industrial processes.

Show More Details
Logo of Harmony Endpoint

Harmony Endpoint

By Check Point Software Technologies

4.8
(86 Ratings)

Harmony Endpoint is a software designed to protect endpoints from cyber threats, including malware, ransomware, phishing, and other forms of attacks. The software provides endpoint detection and response capabilities, enabling organizations to identify, investigate, and remediate threats on user devices. It integrates automated threat prevention technologies and behavioral analysis to detect and block suspicious activities. The software supports centralized management and reporting, allowing administrators to configure security policies and monitor endpoint security status. By addressing vulnerabilities across desktops, laptops, and remote devices, Harmony Endpoint helps organizations reduce the risk of data breaches and maintain compliance with security standards.

Show More Details
Logo of Check Point SandBlast Network

Check Point SandBlast Network

By Check Point Software Technologies

4.6
(85 Ratings)

Check Point SandBlast Network is a network security software that provides advanced threat prevention capabilities to protect organizations against malware, exploits, and zero-day attacks. The software utilizes technologies such as threat emulation and threat extraction to detect and block threats before they reach users, analyzing suspicious files in a virtual environment and delivering sanitized content in real-time. It is designed to address business challenges related to securing network traffic, preventing the spread of sophisticated attacks, and reducing the risk of data breaches. SandBlast Network integrates with security gateways to deliver protection at the perimeter, safeguarding networks from both known and unknown threats without disrupting business operations.

Show More Details
Logo of FortiClient

FortiClient

By Fortinet

4.3
(75 Ratings)

FortiClient is an endpoint security software that provides integrated protection features including antivirus, web filtering, firewall, and VPN capabilities. The software enables secure remote access to corporate networks, helps identify and prevent malware, and enforces security policies across devices. It addresses business needs related to safeguarding endpoints and maintaining compliance with organizational security standards. FortiClient is designed to work within network environments to reduce the risk of data breaches and system compromise by offering centralized management and automated threat response. The software assists organizations in enhancing workforce productivity while maintaining a secure computing environment.

Show More Details
Logo of Symantec Endpoint Security

Symantec Endpoint Security

By Broadcom

4.4
(69 Ratings)

Symantec Endpoint Security is a software designed to provide threat prevention, detection, and response functionalities for endpoints across physical and virtual environments. The software incorporates features such as advanced malware protection, exploit prevention, behavioral analysis, and device control. It enables organizations to manage security policies, monitor endpoint activity, and automate incident response. Symantec Endpoint Security also provides integration with network and cloud security tools, supports central management, and offers capabilities for vulnerability assessment and application control. The software helps address the business problem of protecting endpoints against cyber threats and unauthorized access, facilitating compliance and reducing the risk of data breaches.

Show More Details
Logo of BeyondTrust Privileged Access Management Platform

BeyondTrust Privileged Access Management Platform

By BeyondTrust

4.5
(64 Ratings)

BeyondTrust Privileged Access Management Platform is a software designed to help organizations secure, monitor, and manage privileged accounts and credentials across their information technology environments. The software enables centralized control over privileged user access, automates the enforcement of least privilege policies, and records privileged sessions for audit and compliance purposes. It offers capabilities such as password management, session monitoring, and threat analytics to reduce the risk of unauthorized access and data breaches. The software addresses business challenges related to insider threats, regulatory compliance, and operational inefficiencies by streamlining the management of privileged identities across cloud, hybrid, and on-premises systems.

Show More Details
Logo of Xage Fabric Platform

Xage Fabric Platform

By Xage Security

4.7
(38 Ratings)

The Xage Fabric Platform delivers zero trust remote access and asset protection for cyber-physical systems, enterprise IT, and sensitive data in a unified platform. The Fabric is a highly available, distributed cybersecurity mesh that is deployed as an overlay to deliver access and protection without any downtime, agents, or “rip and replace” of existing technology.

The Fabric enables granular, identity-based control for protecting every asset and application in an operation. The Fabric enforces least privilege across every asset, ensuring that all interactions between users, applications, devices, and data are controlled by central policies. All identity and policy information is propagated through the mesh to assure access and enforcement remain available locally, even if network or cloud connectivity is lost. Administrators can instantly create or revoke groups and policies for devices, applications, and people–streamlining deployments and access while maintaining total control.

Show More Details
Logo of Zscaler Deception

Zscaler Deception

By Zscaler

4.3
(38 Ratings)

Zscaler Deception is a software designed to enhance network security by deploying decoys and traps within digital environments to detect and analyze unauthorized activities. The software provides comprehensive visibility into attacker behavior by simulating real assets and monitoring interactions with decoy systems. Through its threat detection capabilities, it allows organizations to identify malicious actors who attempt to infiltrate networks, enabling early threat identification and investigation. Zscaler Deception integrates with security operations workflows and offers automated alerts, helping organizations to address business challenges related to lateral movement, insider threats, and advanced persistent threats within enterprise ecosystems.

Show More Details
Logo of BOTsink (Legacy)

BOTsink (Legacy)

By SentinelOne

4.7
(37 Ratings)

BOTsink (Legacy) is a software designed to function as a deception platform that helps organizations detect and respond to cyber threats by deploying decoys and traps within a network environment. The software presents attackers with false assets, such as emulated devices and data, to lure threats away from critical systems and observe malicious activities without risking operational systems. BOTsink (Legacy) features automated threat detection, analysis, and alerting capabilities in order to provide security teams with timely information on intrusion attempts and attacker behavior. This software addresses the business problem of identifying security breaches early, reducing the risk of data compromise, and providing actionable intelligence to support incident response strategies.

Show More Details
Logo of Tenable OT Security

Tenable OT Security

By Tenable

4.9
(37 Ratings)

Tenable.ot disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and network level, vulnerability management and configuration control, Tenable’s OT security capabilities gives IT and OT security personnel visibility, security, and control across the entire operation.

Show More Details
Logo of Forescout 4D Platform

Forescout 4D Platform

By Forescout

4.4
(36 Ratings)

Forescout 4D Platform is a software designed to provide automated security and compliance management for connected devices across enterprise environments. The software enables organizations to discover, assess, and control devices on corporate networks, including managed and unmanaged assets. It integrates with existing security tools to deliver asset visibility, risk assessment, and policy enforcement without requiring device agents or prior knowledge of endpoints. Forescout 4D Platform addresses the business problem of managing device security in complex networks by supporting continuous monitoring, threat detection, and automated orchestration of responses to security incidents, helping organizations maintain regulatory compliance and reduce the risk associated with evolving cybersecurity threats.

Show More Details
Logo of FireMon Asset Manager

FireMon Asset Manager

By FireMon

3.9
(34 Ratings)

FireMon Asset Manager is a software that provides organizations with visibility into their network assets, offering continuous monitoring and identification of devices and their configurations. The software gathers real-time asset data to build an accurate inventory and helps maintain compliance with security policies. It assists in detecting unauthorized changes, managing configuration drift, and supporting audit processes. FireMon Asset Manager is designed to address challenges related to asset discovery, compliance reporting, and risk management by automating inventory updates and highlighting potential vulnerabilities through comprehensive asset tracking capabilities.

Show More Details
Logo of Check Point Advanced Endpoint Threat Detection (Legacy)

Check Point Advanced Endpoint Threat Detection (Legacy)

By Check Point Software Technologies

4.5
(31 Ratings)

Check Point Advanced Endpoint Threat Detection (Legacy) is software designed to identify and block advanced security threats targeting endpoint devices within an organization. The software integrates with existing security infrastructure to monitor activity, detect malicious behavior, and prevent unauthorized access to sensitive data and resources. It utilizes threat intelligence and behavioral analysis to uncover vulnerabilities, ransomware, zero-day attacks, and other sophisticated threats. The software streamlines security management by providing automatic responses to detected threats and offering comprehensive reporting tools that help organizations analyze and address incidents efficiently. Its main objective is to protect endpoints from cyberattacks and minimize potential risks to business operations.

Show More Details
Logo of ICSFusion Platform

ICSFusion Platform

By ICSFusion

4.9
(31 Ratings)

ICSFusion Platform is a software designed to facilitate secure management and monitoring of industrial control systems. The software provides features for real-time visibility, asset inventory, risk assessment, and threat detection within operational technology environments. It assists businesses in identifying vulnerabilities, analyzing network traffic, and responding to security incidents to maintain system reliability and integrity. ICSFusion Platform addresses the business problem of securing critical infrastructure by offering capabilities for compliance management, anomaly detection, and centralized reporting, enabling organizations to oversee and protect their industrial operations from cyber threats and operational risks.

Show More Details
Logo of Microsoft Defender for IoT

Microsoft Defender for IoT

By Microsoft

4.4
(28 Ratings)

Microsoft Defender for IoT is a software designed to provide security for Internet of Things (IoT) devices and networks. The software enables businesses to monitor, detect, and respond to threats across a range of IoT environments, including industrial and enterprise settings. It features threat detection capabilities that use behavioral analytics and threat intelligence to identify potential risks and vulnerabilities in IoT assets. The software assists in managing device inventory, assessing security posture, and automating alerts for suspicious activity. By integrating with existing security operations tools, it aims to address the challenge of securing diverse and distributed IoT devices within organizations.

Show More Details

Features of CPS Protection Platforms

Updated March 2026

Mandatory Features:

  • Detailed pedigree of assets, including but not limited to the manufacturer, model, serial number, MAC and IP addresses, operating system, version, service pack, etc. — included for nested devices.

  • Integration with IT security and asset management tools.

  • Risk scoring and recommended actions to include remediation options and impacts on alignment to standards.

  • Threat intelligence information and simulations, as well as recommended actions, to include playbooks and policy enforcement remediation options.

  • Vendor-native asset discovery, visibility and categorization.

  • Support for modern, but also unique, industrial/industry-specific protocols (including reverse-engineered ones deployed decades ago), while not interfering with the operation of any device.

  • Detailed network topology and data flow diagrams.

  • Vulnerability information and recommended actions to include contextualized CVE/CVSS scores and the likelihood of exploitability.

Gartner Research

Magic Quadrant for CPS Protection PlatformsCritical Capabilities for CPS Protection Platforms
Gartner Peer Insights 'Voice of the Customer': CPS Protection Platforms

Top Trending Products

Nozomi Networks PlatformMicrosoft Defender for IoTBeyondTrust Privileged Access Management Platform

Popular Product Comparisons

Nozomi Networks Platform vs The Claroty PlatformDragos Platform vs The Claroty PlatformDragos Platform vs Nozomi Networks PlatformMicrosoft Defender for IoT vs Nozomi Networks PlatformDarktrace / OT vs Opswat MetadefenderThe Claroty Platform vs TXOne StellarPhosphorus Unified xIoT Security Management Platform vs The Claroty PlatformDarktrace / OT vs The Claroty Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.