• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
CPS Protection Platforms

CPS Protection Platforms Reviews and Ratings

What are CPS Protection Platforms?

Gartner defines the cyber-physical systems (CPS) protection platforms market as products that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. CPS protection platforms can be delivered from the cloud, on-premises or in hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Tenable OT Security
Tenable OT Security
Logo of ICSFusion Platform
ICSFusion Platform
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
For 50M-1B USD Companies
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
Logo of Tenable OT Security
Tenable OT Security
Logo of ICSFusion Platform
ICSFusion Platform
For North America
Logo of The Claroty Platform
The Claroty Platform
Logo of Nozomi Networks Platform
Nozomi Networks Platform
Logo of Darktrace / OT
Darktrace / OT
Integration & Deployment
Logo of ICSFusion Platform
ICSFusion Platform
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
Logo of Nozomi Networks Platform
Nozomi Networks Platform

Product Listings

Filter by

Products 1 - 20 of 112
Sort by
Logo of The Claroty Platform

The Claroty Platform

By Claroty

4.8
(305 Ratings)

Claroty provides a cyber-physical systems protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership.

Show More Details
Logo of Nozomi Networks Platform

Nozomi Networks Platform

By Nozomi Networks

4.9
(247 Ratings)
customers choice 2025

Nozomi Networks Platform is a software designed for operational technology and industrial control system security. It provides visibility, monitoring, and threat detection for critical infrastructure and automated industrial environments. The software collects and analyzes data from operational networks to identify vulnerabilities and suspicious activity, helping organizations maintain the reliability and safety of their industrial systems. It integrates with asset management and security operations workflows to support incident response and risk management. The software addresses the business need for continuous monitoring and protection of industrial assets and processes, helping organizations manage cyber and operational risks across geographically distributed sites.

Show More Details
Logo of Darktrace / OT

Darktrace / OT

By Darktrace

4.7
(152 Ratings)

Darktrace / OT is a software designed to provide cyber threat detection and response for operational technology environments. It applies self-learning artificial intelligence to monitor network traffic across industrial control systems and critical infrastructure. The software identifies anomalies and potential threats in real-time by analyzing behavioral patterns without relying on prior knowledge of attack methods. It supports visibility across both IT and OT networks, helping organizations respond to incidents and maintain uptime. Darktrace / OT addresses the challenge of securing complex operational systems where traditional security tools may lack effectiveness due to proprietary protocols and legacy technologies.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.7
(119 Ratings)

Armis Centrix for OT/IoT Security is a cyber exposure management and security solution designed for organizations operating in converged IT and OT environments or those seeking cloud-based and/or on-premises protection for operational technology (OT) and Internet of Things (IoT) assets. It provides visibility, risk assessment, and threat mitigation capabilities across industrial, critical infrastructure, and enterprise environments that may be airgapped, converged or a combination of both. The solution includes policy enforcement, anomaly detection, and behavior analysis features that support early threat identification and help reduce cyber risks and operational disruptions. It integrates with existing security architectures to support resilience, streamline compliance processes, and enable real-time security management at scale.

Show More Details
Logo of Dragos Platform

Dragos Platform

By Dragos

4.5
(104 Ratings)

Dragos Platform is a software designed to provide cybersecurity solutions for industrial control systems and operational technology environments. The software features asset identification, threat detection, incident response, and vulnerability management capabilities. It enables organizations to monitor networks, analyze data for potential risks, and respond to security events within industrial infrastructures. The software addresses business challenges related to safeguarding operational systems from cyber threats, improving visibility into network activity, and supporting compliance with regulatory requirements. It assists organizations in managing and mitigating risks associated with industrial environments while helping maintain operational reliability and security.

Show More Details
Logo of Fortinet OT Security Platform

Fortinet OT Security Platform

By Fortinet

5
(95 Ratings)

Fortinet OT Security Platform is software designed to safeguard operational technology environments by integrating network security, visibility, and control across industrial systems. The software addresses the need for secure connectivity within critical infrastructure by providing threat detection, asset visibility, and risk management capabilities. It offers centralized management for securing converged IT and OT networks and features specialized controls for industrial protocols and legacy assets often found in industrial networks. The software assists organizations in monitoring and enforcing security policies, segmenting networks, and responding to potential cyber threats within operational technology environments, thereby supporting the continuity and reliability of industrial processes.

Show More Details
Logo of Harmony Endpoint

Harmony Endpoint

By Check Point Software Technologies

4.8
(86 Ratings)

Harmony Endpoint is a software designed to protect endpoints from cyber threats, including malware, ransomware, phishing, and other forms of attacks. The software provides endpoint detection and response capabilities, enabling organizations to identify, investigate, and remediate threats on user devices. It integrates automated threat prevention technologies and behavioral analysis to detect and block suspicious activities. The software supports centralized management and reporting, allowing administrators to configure security policies and monitor endpoint security status. By addressing vulnerabilities across desktops, laptops, and remote devices, Harmony Endpoint helps organizations reduce the risk of data breaches and maintain compliance with security standards.

Show More Details
Logo of Check Point SandBlast Network

Check Point SandBlast Network

By Check Point Software Technologies

4.6
(85 Ratings)

Check Point SandBlast Network is a network security software that provides advanced threat prevention capabilities to protect organizations against malware, exploits, and zero-day attacks. The software utilizes technologies such as threat emulation and threat extraction to detect and block threats before they reach users, analyzing suspicious files in a virtual environment and delivering sanitized content in real-time. It is designed to address business challenges related to securing network traffic, preventing the spread of sophisticated attacks, and reducing the risk of data breaches. SandBlast Network integrates with security gateways to deliver protection at the perimeter, safeguarding networks from both known and unknown threats without disrupting business operations.

Show More Details
Logo of FortiClient

FortiClient

By Fortinet

4.3
(75 Ratings)

FortiClient is an endpoint security software that provides integrated protection features including antivirus, web filtering, firewall, and VPN capabilities. The software enables secure remote access to corporate networks, helps identify and prevent malware, and enforces security policies across devices. It addresses business needs related to safeguarding endpoints and maintaining compliance with organizational security standards. FortiClient is designed to work within network environments to reduce the risk of data breaches and system compromise by offering centralized management and automated threat response. The software assists organizations in enhancing workforce productivity while maintaining a secure computing environment.

Show More Details
Logo of Symantec Endpoint Security

Symantec Endpoint Security

By Broadcom

4.4
(69 Ratings)

Symantec Endpoint Security is a software designed to provide threat prevention, detection, and response functionalities for endpoints across physical and virtual environments. The software incorporates features such as advanced malware protection, exploit prevention, behavioral analysis, and device control. It enables organizations to manage security policies, monitor endpoint activity, and automate incident response. Symantec Endpoint Security also provides integration with network and cloud security tools, supports central management, and offers capabilities for vulnerability assessment and application control. The software helps address the business problem of protecting endpoints against cyber threats and unauthorized access, facilitating compliance and reducing the risk of data breaches.

Show More Details
Logo of BeyondTrust Privileged Access Management Platform

BeyondTrust Privileged Access Management Platform

By BeyondTrust

4.5
(63 Ratings)

BeyondTrust Privileged Access Management Platform is a software designed to help organizations secure, monitor, and manage privileged accounts and credentials across their information technology environments. The software enables centralized control over privileged user access, automates the enforcement of least privilege policies, and records privileged sessions for audit and compliance purposes. It offers capabilities such as password management, session monitoring, and threat analytics to reduce the risk of unauthorized access and data breaches. The software addresses business challenges related to insider threats, regulatory compliance, and operational inefficiencies by streamlining the management of privileged identities across cloud, hybrid, and on-premises systems.

Show More Details
Logo of Xage Fabric Platform

Xage Fabric Platform

By Xage Security

4.7
(38 Ratings)

The Xage Fabric Platform delivers zero trust remote access and asset protection for cyber-physical systems, enterprise IT, and sensitive data in a unified platform. The Fabric is a highly available, distributed cybersecurity mesh that is deployed as an overlay to deliver access and protection without any downtime, agents, or “rip and replace” of existing technology.

The Fabric enables granular, identity-based control for protecting every asset and application in an operation. The Fabric enforces least privilege across every asset, ensuring that all interactions between users, applications, devices, and data are controlled by central policies. All identity and policy information is propagated through the mesh to assure access and enforcement remain available locally, even if network or cloud connectivity is lost. Administrators can instantly create or revoke groups and policies for devices, applications, and people–streamlining deployments and access while maintaining total control.

Show More Details
Logo of Zscaler Deception

Zscaler Deception

By Zscaler

4.3
(38 Ratings)

Zscaler Deception is a software designed to enhance network security by deploying decoys and traps within digital environments to detect and analyze unauthorized activities. The software provides comprehensive visibility into attacker behavior by simulating real assets and monitoring interactions with decoy systems. Through its threat detection capabilities, it allows organizations to identify malicious actors who attempt to infiltrate networks, enabling early threat identification and investigation. Zscaler Deception integrates with security operations workflows and offers automated alerts, helping organizations to address business challenges related to lateral movement, insider threats, and advanced persistent threats within enterprise ecosystems.

Show More Details
Logo of BOTsink (Legacy)

BOTsink (Legacy)

By SentinelOne

4.7
(37 Ratings)

BOTsink (Legacy) is a software designed to function as a deception platform that helps organizations detect and respond to cyber threats by deploying decoys and traps within a network environment. The software presents attackers with false assets, such as emulated devices and data, to lure threats away from critical systems and observe malicious activities without risking operational systems. BOTsink (Legacy) features automated threat detection, analysis, and alerting capabilities in order to provide security teams with timely information on intrusion attempts and attacker behavior. This software addresses the business problem of identifying security breaches early, reducing the risk of data compromise, and providing actionable intelligence to support incident response strategies.

Show More Details
Logo of Tenable OT Security

Tenable OT Security

By Tenable

4.9
(37 Ratings)

Tenable.ot disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and network level, vulnerability management and configuration control, Tenable’s OT security capabilities gives IT and OT security personnel visibility, security, and control across the entire operation.

Show More Details
Logo of Forescout 4D Platform

Forescout 4D Platform

By Forescout

4.4
(36 Ratings)

Forescout 4D Platform is a software designed to provide automated security and compliance management for connected devices across enterprise environments. The software enables organizations to discover, assess, and control devices on corporate networks, including managed and unmanaged assets. It integrates with existing security tools to deliver asset visibility, risk assessment, and policy enforcement without requiring device agents or prior knowledge of endpoints. Forescout 4D Platform addresses the business problem of managing device security in complex networks by supporting continuous monitoring, threat detection, and automated orchestration of responses to security incidents, helping organizations maintain regulatory compliance and reduce the risk associated with evolving cybersecurity threats.

Show More Details
Logo of FireMon Asset Manager

FireMon Asset Manager

By FireMon

3.9
(34 Ratings)

FireMon Asset Manager is a software that provides organizations with visibility into their network assets, offering continuous monitoring and identification of devices and their configurations. The software gathers real-time asset data to build an accurate inventory and helps maintain compliance with security policies. It assists in detecting unauthorized changes, managing configuration drift, and supporting audit processes. FireMon Asset Manager is designed to address challenges related to asset discovery, compliance reporting, and risk management by automating inventory updates and highlighting potential vulnerabilities through comprehensive asset tracking capabilities.

Show More Details
Logo of Check Point Advanced Endpoint Threat Detection (Legacy)

Check Point Advanced Endpoint Threat Detection (Legacy)

By Check Point Software Technologies

4.5
(31 Ratings)

Check Point Advanced Endpoint Threat Detection (Legacy) is software designed to identify and block advanced security threats targeting endpoint devices within an organization. The software integrates with existing security infrastructure to monitor activity, detect malicious behavior, and prevent unauthorized access to sensitive data and resources. It utilizes threat intelligence and behavioral analysis to uncover vulnerabilities, ransomware, zero-day attacks, and other sophisticated threats. The software streamlines security management by providing automatic responses to detected threats and offering comprehensive reporting tools that help organizations analyze and address incidents efficiently. Its main objective is to protect endpoints from cyberattacks and minimize potential risks to business operations.

Show More Details
Logo of ICSFusion Platform

ICSFusion Platform

By ICSFusion

4.9
(31 Ratings)

ICSFusion Platform is a software designed to facilitate secure management and monitoring of industrial control systems. The software provides features for real-time visibility, asset inventory, risk assessment, and threat detection within operational technology environments. It assists businesses in identifying vulnerabilities, analyzing network traffic, and responding to security incidents to maintain system reliability and integrity. ICSFusion Platform addresses the business problem of securing critical infrastructure by offering capabilities for compliance management, anomaly detection, and centralized reporting, enabling organizations to oversee and protect their industrial operations from cyber threats and operational risks.

Show More Details
Logo of Microsoft Defender for IoT

Microsoft Defender for IoT

By Microsoft

4.5
(26 Ratings)

Microsoft Defender for IoT is a software designed to provide security for Internet of Things (IoT) devices and networks. The software enables businesses to monitor, detect, and respond to threats across a range of IoT environments, including industrial and enterprise settings. It features threat detection capabilities that use behavioral analytics and threat intelligence to identify potential risks and vulnerabilities in IoT assets. The software assists in managing device inventory, assessing security posture, and automating alerts for suspicious activity. By integrating with existing security operations tools, it aims to address the challenge of securing diverse and distributed IoT devices within organizations.

Show More Details

Features of CPS Protection Platforms

Updated March 2025

Mandatory Features:

  • Risk scoring and recommended actions

  • Threat intelligence information and recommended actions

  • Detailed pedigree of assets, including nested devices

  • Detailed network topology and data flow diagrams

  • Vulnerability information and recommended actions

  • Integration with IT security tools

  • Support for both modern and unique industrial protocols while not interfering with the operation of any device

  • Vendor-native asset discovery, visibility and categorization

Gartner Research

Magic Quadrant for CPS Protection PlatformsCritical Capabilities for CPS Protection Platforms
Gartner Peer Insights 'Voice of the Customer': CPS Protection Platforms

Top Trending Products

The Claroty PlatformNozomi Networks PlatformMicrosoft Defender for IoTSymantec Endpoint Security

Popular Product Comparisons

Nozomi Networks Platform vs The Claroty PlatformDragos Platform vs The Claroty PlatformDragos Platform vs Nozomi Networks PlatformMicrosoft Defender for IoT vs Nozomi Networks PlatformDarktrace / OT vs Opswat MetadefenderThe Claroty Platform vs TXOne StellarPhosphorus Unified xIoT Security Management Platform vs The Claroty PlatformDarktrace / OT vs The Claroty Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.