CPS Protection Platforms Reviews and Ratings
What are CPS Protection Platforms?
Gartner defines the cyber-physical systems (CPS) protection platforms market as products that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. CPS protection platforms can be delivered from the cloud, on-premises or in hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.
Product Listings
Filter by
Claroty provides a cyber-physical systems (CPS) protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership. The company is headquartered in New York City with a presence in EMEA, Asia-Pacific, and the Americas.
Nozomi Networks is engaged in safeguarding critical infrastructure from cyber threats. The company's unique platform integrates network and endpoint visibility with threat detection, and utilizes artificial intelligence for quicker, more effective response to incidents. The services provided offer a reduction in risk and complexity while enhancing operational resilience.
Darktrace is a Cambridge, UK-based firm concentrating on the mitigation of cyber disruptions globally. The company employs a unique AI technology used by thousands of businesses globally to counteract, identify, react to, and recover from cyber-attacks. With a team of over 2200 people spread over 30 global offices, Darktrace is dedicated to containing the global impacts of cyber threats.
Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.
Dragos is a company dedicated to industrial cybersecurity, focusing on the protection of critical infrastructure. The Dragos Platform provides technology that enables visibility into Industrial Control Systems/Operational Technology (ICS/OT) assets, vulnerabilities, threats, and mitigation strategies. This platform supports a broad range of industries such as electric, oil and gas, manufacturing, chemical, government sectors and more. The company's strength lies in its capacity to incorporate its comprehensive OT threat intelligence and insights from the service team into the software. Dragos maintains a worldwide presence, with its main operations based in the Washington, DC area, and regional operations in Canada, Australia, New Zealand, Europe, and the Middle East.
Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.
Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.
Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.
Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.
Armis, the asset intelligence cybersecurity company, protects the entire attack surface and manages the organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less world Armis ensures that organizations continuously see, protect and manage all critical assets. Armis secures Fortune 100, 200 and 500 companies as well as national governments, state and local entities to help keep critical infrastructure, economies and society safe and secure 24/7. Armis is a privately held company headquartered in California.
BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.
Zscaler is a globally recognized company that specializes in securing network and application transformations for mobile and cloud based platforms of major organizations. The primary services it offers are Zscaler Internet Access and Zscaler Private Access. These services are developed to create rapid, robust links between users and applications, independent of the device, location, or network. Fully delivered through cloud, Zscaler services aim to provide simplicity, enhanced cybersecurity, and better user experience which can be a challenge for traditional appliances or hybrid solutions. Functioning in over 185 countries, Zscaler operates a vast cloud security platform to protect numerous enterprises and governmental agencies from cyber threats and potential data loss.
SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.
At Forescout, we envision a world where every cyber asset is seen, secure and compliant. We are a global provider of cybersecurity solutions that continuously identify, protect and help ensure the compliance of all managed and unmanaged cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout Platform delivers comprehensive capabilities for network security, risk and exposure management, and threat detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, we enable customers to manage cyber risk and mitigate threats more effectively.
FireMon is centered on enhancing security operations to achieve improved security results. The company provides superior security policy management, cloud security operations, and cybersecurity asset management solutions to enterprises globally. The security policy management platform created by FireMon is a real-time solution addressing firewall and cloud security policy-related risks, undertaking policy changes, and imposing compliance. Besides, FireMon's DisruptOps is a distributed cloud security operations solution capable of detecting and responding to issues in dynamic public cloud environments. The firm also offers Lumeta, a cloud-based cybersecurity asset management solution that has the capability to scan an entire enterprise infrastructure and provide insights into the network's interconnectivity.
Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.
ICSFusion Platform is an advanced solution designed to provide comprehensive visibility, cybersecurity, and compliance for operational technology (OT), Internet of Things (IoT), and other connected devices. The platform operates in a fully passive mode to ensure non-intrusive monitoring, and it also offers selective query capabilities to obtain specific data when necessary. ICSFusion Platform addresses critical business needs such as safeguarding industrial and IoT environments from cybersecurity threats and ensuring regulatory compliance, all while maintaining operational integrity and minimizing disruptions.
Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe.
Xage provides zero trust access and protection from one unified platform. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain.
Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.
Microsoft Security helps protect people and data against cyberthreats to give peace of mind.
Features of CPS Protection Platforms
Updated March 2025Mandatory Features:
Risk scoring and recommended actions
Threat intelligence information and recommended actions
Detailed pedigree of assets, including nested devices
Detailed network topology and data flow diagrams
Vulnerability information and recommended actions
Integration with IT security tools
Support for both modern and unique industrial protocols while not interfering with the operation of any device
Vendor-native asset discovery, visibility and categorization