• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
CPS Protection Platforms

CPS Protection Platforms Reviews and Ratings

What are CPS Protection Platforms?

Gartner defines the cyber-physical systems (CPS) protection platforms market as products that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. CPS protection platforms can be delivered from the cloud, on-premises or in hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Tenable OT Security
Tenable OT Security
Logo of ICSFusion Platform
ICSFusion Platform
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
For 50M-1B USD Companies
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
Logo of Tenable OT Security
Tenable OT Security
Logo of ICSFusion Platform
ICSFusion Platform
For North America
Logo of The Claroty Platform
The Claroty Platform
Logo of Nozomi Networks Platform
Nozomi Networks Platform
Logo of Darktrace / OT
Darktrace / OT
Integration & Deployment
Logo of ICSFusion Platform
ICSFusion Platform
Logo of Fortinet OT Security Platform
Fortinet OT Security Platform
Logo of Nozomi Networks Platform
Nozomi Networks Platform

Product Listings

Filter by

Products 1 - 20 of 112
Sort by
Logo of The Claroty Platform

The Claroty Platform

By Claroty

4.8
(302 Ratings)

Claroty provides a cyber-physical systems (CPS) protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership. The company is headquartered in New York City with a presence in EMEA, Asia-Pacific, and the Americas.

Show More Details
Logo of Nozomi Networks Platform

Nozomi Networks Platform

By Nozomi Networks

4.9
(246 Ratings)
customers choice 2025

Nozomi Networks is engaged in safeguarding critical infrastructure from cyber threats. The company's unique platform integrates network and endpoint visibility with threat detection, and utilizes artificial intelligence for quicker, more effective response to incidents. The services provided offer a reduction in risk and complexity while enhancing operational resilience.

Show More Details
Logo of Darktrace / OT

Darktrace / OT

By Darktrace

4.7
(152 Ratings)

Darktrace is a Cambridge, UK-based firm concentrating on the mitigation of cyber disruptions globally. The company employs a unique AI technology used by thousands of businesses globally to counteract, identify, react to, and recover from cyber-attacks. With a team of over 2200 people spread over 30 global offices, Darktrace is dedicated to containing the global impacts of cyber threats.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.7
(119 Ratings)

Armis, the asset intelligence cybersecurity company, protects the entire attack surface and manages the organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less world Armis ensures that organizations continuously see, protect and manage all critical assets. Armis secures Fortune 100, 200 and 500 companies as well as national governments, state and local entities to help keep critical infrastructure, economies and society safe and secure 24/7. Armis is a privately held company headquartered in California.

Show More Details
Logo of Dragos Platform

Dragos Platform

By Dragos

4.5
(104 Ratings)

Dragos is a company dedicated to industrial cybersecurity, focusing on the protection of critical infrastructure. The Dragos Platform provides technology that enables visibility into Industrial Control Systems/Operational Technology (ICS/OT) assets, vulnerabilities, threats, and mitigation strategies. This platform supports a broad range of industries such as electric, oil and gas, manufacturing, chemical, government sectors and more. The company's strength lies in its capacity to incorporate its comprehensive OT threat intelligence and insights from the service team into the software. Dragos maintains a worldwide presence, with its main operations based in the Washington, DC area, and regional operations in Canada, Australia, New Zealand, Europe, and the Middle East.

Show More Details
Logo of Fortinet OT Security Platform

Fortinet OT Security Platform

By Fortinet

5
(95 Ratings)

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Harmony Endpoint

Harmony Endpoint

By Check Point Software Technologies

4.8
(86 Ratings)

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details
Logo of Check Point SandBlast Network

Check Point SandBlast Network

By Check Point Software Technologies

4.6
(83 Ratings)

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details
Logo of FortiClient

FortiClient

By Fortinet

4.3
(75 Ratings)

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Symantec Endpoint Security

Symantec Endpoint Security

By Broadcom

4.4
(68 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of BeyondTrust Privileged Access Management Platform

BeyondTrust Privileged Access Management Platform

By BeyondTrust

4.5
(63 Ratings)

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details
Logo of Zscaler Deception

Zscaler Deception

By Zscaler

4.3
(38 Ratings)

Zscaler is a globally recognized company that specializes in securing network and application transformations for mobile and cloud based platforms of major organizations. The primary services it offers are Zscaler Internet Access and Zscaler Private Access. These services are developed to create rapid, robust links between users and applications, independent of the device, location, or network. Fully delivered through cloud, Zscaler services aim to provide simplicity, enhanced cybersecurity, and better user experience which can be a challenge for traditional appliances or hybrid solutions. Functioning in over 185 countries, Zscaler operates a vast cloud security platform to protect numerous enterprises and governmental agencies from cyber threats and potential data loss.

Show More Details
Logo of BOTsink (Legacy)

BOTsink (Legacy)

By SentinelOne

4.7
(37 Ratings)

SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.

Show More Details
Logo of Tenable OT Security

Tenable OT Security

By Tenable

4.9
(37 Ratings)

Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe.

Show More Details
Logo of Forescout 4D Platform

Forescout 4D Platform

By Forescout

4.4
(36 Ratings)

At Forescout, we envision a world where every cyber asset is seen, secure and compliant. We are a global provider of cybersecurity solutions that continuously identify, protect and help ensure the compliance of all managed and unmanaged cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout Platform delivers comprehensive capabilities for network security, risk and exposure management, and threat detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, we enable customers to manage cyber risk and mitigate threats more effectively.

Show More Details
Logo of FireMon Asset Manager

FireMon Asset Manager

By FireMon

3.9
(34 Ratings)

FireMon is centered on enhancing security operations to achieve improved security results. The company provides superior security policy management, cloud security operations, and cybersecurity asset management solutions to enterprises globally. The security policy management platform created by FireMon is a real-time solution addressing firewall and cloud security policy-related risks, undertaking policy changes, and imposing compliance. Besides, FireMon's DisruptOps is a distributed cloud security operations solution capable of detecting and responding to issues in dynamic public cloud environments. The firm also offers Lumeta, a cloud-based cybersecurity asset management solution that has the capability to scan an entire enterprise infrastructure and provide insights into the network's interconnectivity.

Show More Details
Logo of Check Point Advanced Endpoint Threat Detection (Legacy)

Check Point Advanced Endpoint Threat Detection (Legacy)

By Check Point Software Technologies

4.5
(31 Ratings)

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details
Logo of ICSFusion Platform

ICSFusion Platform

By ICSFusion

4.9
(31 Ratings)

ICSFusion Platform is an advanced solution designed to provide comprehensive visibility, cybersecurity, and compliance for operational technology (OT), Internet of Things (IoT), and other connected devices. The platform operates in a fully passive mode to ensure non-intrusive monitoring, and it also offers selective query capabilities to obtain specific data when necessary. ICSFusion Platform addresses critical business needs such as safeguarding industrial and IoT environments from cybersecurity threats and ensuring regulatory compliance, all while maintaining operational integrity and minimizing disruptions.

Show More Details
Logo of Xage Fabric Platform

Xage Fabric Platform

By Xage Security

4.7
(27 Ratings)

Xage provides zero trust access and protection from one unified platform. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain.

Show More Details
Logo of Microsoft Defender for IoT

Microsoft Defender for IoT

By Microsoft

4.7
(24 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details

Features of CPS Protection Platforms

Updated March 2025

Mandatory Features:

  • Risk scoring and recommended actions

  • Threat intelligence information and recommended actions

  • Detailed pedigree of assets, including nested devices

  • Detailed network topology and data flow diagrams

  • Vulnerability information and recommended actions

  • Integration with IT security tools

  • Support for both modern and unique industrial protocols while not interfering with the operation of any device

  • Vendor-native asset discovery, visibility and categorization

Gartner Research

Magic Quadrant for CPS Protection PlatformsCritical Capabilities for CPS Protection Platforms
Gartner Peer Insights 'Voice of the Customer': CPS Protection Platforms

Top Trending Products

Armis CentrixHarmony EndpointCheck Point SandBlast NetworkThe Claroty PlatformNozomi Networks PlatformFortiClientSymantec Endpoint SecurityFortinet OT Security Platform

Popular Product Comparisons

Nozomi Networks Platform vs The Claroty PlatformDragos Platform vs The Claroty PlatformDragos Platform vs Nozomi Networks PlatformMicrosoft Defender for IoT vs Nozomi Networks PlatformThe Claroty Platform vs TXOne StellarDarktrace / OT vs Opswat MetadefenderPhosphorus Unified xIoT Security Management Platform vs The Claroty Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.