Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.
"Exemplifying Top-Notch OT Network Visibility and Endpoint Awareness"
The deployment objective of the Nozomi solution was to obtain key visibility from a cybersecurity perspective into the threats and network communications into the deployed automation system. We achieved this by developing the design through a series of reviews and preparation of HLD/LLD design documents, following the same up with a factory acceptance test, deployment and site acceptance tests to validate various use cases in close coordination with the vendor's PS team and the customer's joint participation leading to a fruitful outcome. Nozomi does standout in terms of the visibility that it provides in terms of traffic on the network, protocol and utilization counts. Security investigation is something that thankfully we have not had a need to fully utilize owing to a lack of a serious threat. But the visualization and topology map/graph are good investigative tools to dig in deeper.
"DarkTrace: A Hero that doesn't stop saving companies."
Darktrace is one of the most important implementations we've added to our infrastructure because of it's incredible pattern recognition, detection, and automation to threats that aren't easily recognizable without AI.
"Claroty's Plataform is a Good Option that Provides Compliance and Risk Management. "
We achieve a great visibility of our OT environment, reduces the number of IOT threats and downtime in the environment. The Claroty plataform provides funcionaly and performance with a good future vision and new featuers in roadmap. The support service has a great expertise and strong consulting partnership.
"Achieving User Satisfaction with a Reliable Product"
I have been using this product for the last two years and I found it extremely easy to use and it gets integrated with other MFA platforms.
"Symantec Endpoint: A Powerful Tool Against Malicious Attacks"
Symantec Endpoint is a great tool for guarding against malicious attacks on corporate assets.
"Thoroughly research and understand the product"
Beyondtrust Pam have provided an exceptional experience. I would highly recommend
"Zscaler Deception: Elevating security with Proactive Threat Detection"
The overall experience with this product till now is quite good, it emphasizes the below aspects: 1) Comprehensive Protection 2) User-Friendly Interface 3) Effective Threat Diversion 4) Seamless Integration 5) Actionable Insights
""Attivo Network Threat Deception""
It provides extensive attack analysis and adequate visibility into attacker's lateral movement.
"Immediate alerts for the business in case of any data breach"
The tool brings immediate alerts for the security team in case of any data breach happens. Overall the tool is powerful and can accommodate a lot of threats which might go unnoticed usually.
"Good Solution for companies in the Operational Technology Domain"
Excellent Support provided during and post implementation.
"Check Point Advanced Endpoint Threat Detection Overall Review"
Checkpoint Advance Endpoint Threat Detection is a great tool and is use to secure the endpoints from any type of vulnerabilities and attack that can cause harm to our system. It is a single solution which provides feature likes threat removal, quarantine malicious file, stopping threats etc. It has good ability like prevention, detection and response for the malicious file and attack.
"Armis Centralizes Cyber Risk Overview for IT & OT"
Armis is a great platforms that helps centralize our cyber risk overall view for both IT & OT
"Excellent Platform for Threat Management"
Ultimate threat management and vulnerability management platform for OT /IT environment
"Exploring the Robust Sandbox and Analysis Tool's Scalability"
Excellent inline sandbox and analysis tool that scales and delivers
"I`m security engineer and this product is helping us with wired wireless security."
Amazing product, which helps a lot with security and endpoint visibility of company network.
"Fortanix Data Security Manager: Control, Confidentiality and AI Combined"
Fortanix Data Security Manager has been the best data security management tool for us. It leverages AI to detect possible data breaches. It has also proved to be cost effective for us providing cost savings of 34% as compared to our previous security vendor. We all love it and trust it to the fullest. It's very convenient and easy to use as well.
"Good "
Cyberx made our job easier. Now more visible out Ot Network side. It's easy to use and has good monitoring solutions. We are quite satisfied
"HSM's for Cryptographic Keys Security "
Network Attached HSM (Gemalto/Thales) is best in class for protecting the crypto keys. Storage and Generation for (Online & Offline) certificate authority keys-PKI.
"OT Security monitoring and more in weeks, not months or years! Quick results"
Excellent experience from the POV/POC. Always available, methodical and professional to have an efficient product testing experience. Easy and understandable installation and configuration of the product. Very robust and mature, providing you with significant information in a short time, unlike other products that require a long period of design, installation and configuration that can take months or even years.
"Harmony Endpoint: Protecting against ransomware with private technology for backups"
Harmony Endpoint has a big granularity in the policies that allows administrators to separate groups of assets with different restrictions. By default it is quite prohibitive so it is ideal to implement it at the beginning of an organization in order to debug and adjust it.