Operational Technology Security Reviews and Ratings

What is Operational Technology Security?

Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.

Products In Operational Technology Security Market

"Exemplifying Top-Notch OT Network Visibility and Endpoint Awareness"

The deployment objective of the Nozomi solution was to obtain key visibility from a cybersecurity perspective into the threats and network communications into the deployed automation system. We achieved this by developing the design through a series of reviews and preparation of HLD/LLD design documents, following the same up with a factory acceptance test, deployment and site acceptance tests to validate various use cases in close coordination with the vendor's PS team and the customer's joint participation leading to a fruitful outcome. Nozomi does standout in terms of the visibility that it provides in terms of traffic on the network, protocol and utilization counts. Security investigation is something that thankfully we have not had a need to fully utilize owing to a lack of a serious threat. But the visualization and topology map/graph are good investigative tools to dig in deeper.

Read reviews

"DarkTrace: A Hero that doesn't stop saving companies."

Darktrace is one of the most important implementations we've added to our infrastructure because of it's incredible pattern recognition, detection, and automation to threats that aren't easily recognizable without AI.

Read reviews

"Claroty's Plataform is a Good Option that Provides Compliance and Risk Management. "

We achieve a great visibility of our OT environment, reduces the number of IOT threats and downtime in the environment. The Claroty plataform provides funcionaly and performance with a good future vision and new featuers in roadmap. The support service has a great expertise and strong consulting partnership.

Read reviews

"Achieving User Satisfaction with a Reliable Product"

I have been using this product for the last two years and I found it extremely easy to use and it gets integrated with other MFA platforms.

Read reviews

"Symantec Endpoint: A Powerful Tool Against Malicious Attacks"

Symantec Endpoint is a great tool for guarding against malicious attacks on corporate assets.

Read reviews

"Thoroughly research and understand the product"

Beyondtrust Pam have provided an exceptional experience. I would highly recommend

Read reviews

"Zscaler Deception: Elevating security with Proactive Threat Detection"

The overall experience with this product till now is quite good, it emphasizes the below aspects: 1) Comprehensive Protection 2) User-Friendly Interface 3) Effective Threat Diversion 4) Seamless Integration 5) Actionable Insights

Read reviews

""Attivo Network Threat Deception""

It provides extensive attack analysis and adequate visibility into attacker's lateral movement.

Read reviews

"Immediate alerts for the business in case of any data breach"

The tool brings immediate alerts for the security team in case of any data breach happens. Overall the tool is powerful and can accommodate a lot of threats which might go unnoticed usually.

Read reviews

"Good Solution for companies in the Operational Technology Domain"

Excellent Support provided during and post implementation.

Read reviews

"Check Point Advanced Endpoint Threat Detection Overall Review"

Checkpoint Advance Endpoint Threat Detection is a great tool and is use to secure the endpoints from any type of vulnerabilities and attack that can cause harm to our system. It is a single solution which provides feature likes threat removal, quarantine malicious file, stopping threats etc. It has good ability like prevention, detection and response for the malicious file and attack.

Read reviews

"Excellent Platform for Threat Management"

Ultimate threat management and vulnerability management platform for OT /IT environment

Read reviews

"Armis Centralizes Cyber Risk Overview for IT & OT"

Armis is a great platforms that helps centralize our cyber risk overall view for both IT & OT

Read reviews

"Exploring the Robust Sandbox and Analysis Tool's Scalability"

Excellent inline sandbox and analysis tool that scales and delivers

Read reviews

"I`m security engineer and this product is helping us with wired wireless security."

Amazing product, which helps a lot with security and endpoint visibility of company network.

Read reviews

"Fortanix Data Security Manager: Control, Confidentiality and AI Combined"

Fortanix Data Security Manager has been the best data security management tool for us. It leverages AI to detect possible data breaches. It has also proved to be cost effective for us providing cost savings of 34% as compared to our previous security vendor. We all love it and trust it to the fullest. It's very convenient and easy to use as well.

Read reviews

"Harmony Endpoint: Protecting against ransomware with private technology for backups"

Harmony Endpoint has a big granularity in the policies that allows administrators to separate groups of assets with different restrictions. By default it is quite prohibitive so it is ideal to implement it at the beginning of an organization in order to debug and adjust it.

Read reviews

"Tenable OT: Centralizing and Visualizing OT Environments"

Tenable OT helps us to have high visibility of our asset inventory accurately. Now we are able to have a complete view of our attack surface including IT assets

Read reviews

"Good "

Cyberx made our job easier. Now more visible out Ot Network side. It's easy to use and has good monitoring solutions. We are quite satisfied

Read reviews

"HSM's for Cryptographic Keys Security "

Network Attached HSM (Gemalto/Thales) is best in class for protecting the crypto keys. Storage and Generation for (Online & Offline) certificate authority keys-PKI.

Read reviews
Products 1 - 20