Operational Technology Security Reviews and Ratings
What is Operational Technology Security?
Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”.
OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the...
Product Listings
Products 1 - 20 of 118
Sort by
Nozomi Networks is engaged in safeguarding critical infrastructure from cyber threats. The company's unique platform integrates network and endpoint visibility with threat detection, and utilizes artificial intelligence for quicker, more effective response to incidents. The...
Show More Details
Darktrace is a Cambridge, UK-based firm concentrating on the mitigation of cyber disruptions globally. The company employs a unique AI technology used by thousands of businesses globally to counteract, identify, react to, and recover from...
Show More Details
Claroty provides security solutions for cyber-physical systems across industrial, healthcare, commercial, and public sector environments -- including operational technology (OT), connected medical devices (IoMT), building management systems (BMS), and enterprise IoT. Its unified platform integrates...
Show More Details
Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is...
Show More Details
Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.
Show More Details
BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer...
Show More Details
Zscaler is a globally recognized company that specializes in securing network and application transformations for mobile and cloud based platforms of major organizations. The primary services it offers are Zscaler Internet Access and Zscaler Private...
Show More Details
SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and...
Show More Details
FireMon is centered on enhancing security operations to achieve improved security results. The company provides superior security policy management, cloud security operations, and cybersecurity asset management solutions to enterprises globally. The security policy management platform...
Show More Details
Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including...
Show More Details
Waterfall Security Solutions is an industrial cybersecurity company, protecting critical industrial networks since 2007. Our mission is to revolutionize how entire industries protect physical assets and industrial processes from cyber attacks. Waterfall’s patented, unidirectional products...
Show More Details
Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including...
Show More Details
Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including...
Show More Details
Armis, the asset intelligence cybersecurity company, protects the entire attack surface and manages the organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less world Armis ensures that organizations continuously see, protect and...
Show More Details
Dragos is a company dedicated to industrial cybersecurity, focusing on the protection of critical infrastructure. The Dragos Platform provides technology that enables visibility into Industrial Control Systems/Operational Technology (ICS/OT) assets, vulnerabilities, threats, and mitigation strategies....
Show More Details
At Forescout, we envision a world where every cyber asset is seen, secure and compliant. We are a global provider of cybersecurity solutions that continuously identify, protect and help ensure the compliance of all managed...
Show More Details
Fortanix operates in the sphere of multi-cloud security with a central focus on Confidential Computing. The company's primary business problem is the challenge of securing sensitive data that is dispersed across different platforms such as...
Show More Details
Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to...
Show More Details
Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack...
Show More Details
Thales is a worldwide entity focusing on digital security. The company's main objective is to provide trust in an ever-increasing digitally interconnected society. To achieve this, Thales has developed a variety of products, software, and...
Show More Details