Gartner defines the cyber-physical systems (CPS) protection platforms market as products and services that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance. Attributes of these platforms include: - Discovery, visibility and categorization of CPS assets - Detailed pedigree of assets - Support for proprietary industrial protocols - Detailed network diagrams and data flows - Vulnerability information - Threat intelligence management - Integration with IT security tools
"Fast and Efficient: Claroty's Global Deployment of Cloud Platform"
Claroty has proven to be an exceptional business partner. Their commitment to customer service and technical support is evident, as I have been able to easily reach and communicate with employees at all levels of the organization. The actively listen to and encourage customer feedback, implementing product updates based on this input. The deployment of their cloud platform was both swift and seamless. We successfully deployed to 20 global manufacturing plants within 6 to 8 weeks, achieving approximately 90% visibility of our OT assets. Throughout the deployment process, their technical account manager provided invaluable guidance, suggesting configuration changes to enhance the platform's utility to our specific needs.
"Measuring the Impact of Nozomi's Customizability for Security Teams"
Nozomi is a powerful and flexible tool that offers significant value to organizations looking to enhance their security posture. They have excellent support, high customizability, and strong incident management capabilities. It is without a doubt well-suited for any organization with complex and evolving security needs. Remediations are mapped to MITRE and there are incident response playbooks. However, there is room for improvement in their designs for dashboards and workbooks as well as providing more detailed remediation guidance. Despite these areas for growth, Nozomi remains a strong contender as one of the best OT solutions.
"Armis Cybersecurity Solution: A Tool for Faster Vulnerability Resolution"
Armis provides the Cybersecurity team with what it needs seamlessly. It helps us manage our assets, identify and resolve vulnerabilities faster, and helps us make better decisions on our security policy. Our customer success manager has always made himself available to us, which is key in being able to understand Armis' capabilities and how it benefits our organization.
"Trusted OT Security Partner: Effective Threat Detection Meets Best-in-Class Asset Mgmt"
Dragos demonstrated exceptional knowledge in ICS/OT security, particularly in securing our manufacturing environment. They possess a deep understanding of the unique challenges in OT environments and have a proven track record in mitigating industry specific cyber threats. Their experience in protecting operational technology has been invaluable in enhancing our cybersecurity posture.
"Tenable OT Security: A Flexible Tool With Comprehensive Reporting"
Tenable OT Security is very flexible with customization to accommodate my OT environment and needs. The traffic between the IT and OT networks is visible now. It has great customer support and the engineer is able to answer all the questions during any event. This solution also has an advantage of easy integration feature with other security products.
"Experience Flawless File Scanning With Zero False Positives"
Perfect file scanning solution with zero false positives.
"Powerful Tool with Robust Performance and Exceptional Support "
A powerful tool for gaining insights into OT networks, with the learning phase and rule definition contributing to its effectiveness.
"Phosphorus -- Effective xIoT discovery and security"
Phosphorus has truly proven to be a valuable addition to our portfolio. The product delivers as advertised, but what truly differentiates Phosphorus from other companies in this space is their support organization. They are able to rapidly turn around any additional features or detected devices that were needed to be added to their platform. Easy UI and great account team!
"Anomaly Detection: Darktrace's Strength in Highlighting Threats"
Darktrace has been a good partner in helping us get the most of our investment. We have regular meetings with them to ensure our deployment is healthy and identify any opportunities for us to improve our usage of the tool.
"Foresout provides comprehensive visibility and control of my network"
Excellent customer service. Very tentative with our needs and works closely with us to ensure we are fully utilizing Forescout
Competitor or alternative data is currently unavailable
See All Alternatives"XAGE Fabric is a game changer in provide secure access to sensitive/critical environments."
They are an extremely responsive organization with knowledgeable and informative support engineers. They are a true partner in that they will and want to assist you in any way they can. This through their own efforts or by bringing in additional parties and building larger partnerships.
"TXOne/Velta: A Robust Solution for OT/ICS Space"
My overall experience with TXOne/Velta has been very good. Everyone involved has been friendly, knowledgeable, and supportive.
"OT Security by PANW Strata Firewalls"
PANW provides a complete and strong security platform. OT Security is a very important part of it when you are working in a manufacturing company. The challenges are big and the OT-Security of PANW provides valuable insights into the OT-Network. Additionally, it is directly integrated into PANW's security platform so all information is natively sent to PANW's Datalake and adds helpful information to the overall operational security. The dashboards are comprehensive and provide a detailed overall view and it is possible to go deeper whenever it is necessary.
Competitor or alternative data is currently unavailable
See All Alternatives"Microsoft Defender is Endpoint easy to use and implement or configuration."
Microsoft Defender is easy to use, and very easy for implementation and configuration.
"Forescout: Bridging Gap in Industrial System Security amidst Minor Cloud Limitations"
Forescout has been intrumental in significantly enhancing our overall security posture. The platform has provided us with extensive visibility and control over our assets, particularly our industrial systemas, which are often more challenging to manage. One of the most impactful aspects has been the ability to streamline and automate manu of our risk management processes, thanks to Forescouts robust capabilities in assessing and managing asset security posture and behaviour analitycs. This level of automation has allowed us to proactively address vulnerabilities and ensure continuous monitoring, ultimately improving our cybersecurity operations and reducing the manual workload for our team. Forescout has proven to be an invaluable tool in protecting our infrstructure and improving operational efficiency.