Operational Technology Security Reviews and Ratings

What is Operational Technology Security?

Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”.

OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.

Product Listings

Filter by

Products 1 - 20 of 120

Nozomi Networks is engaged in safeguarding critical infrastructure from cyber threats. The company's unique platform integrates network and endpoint visibility with threat detection, and utilizes artificial intelligence for quicker, more effective response to incidents. The services provided offer a reduction in risk and complexity while enhancing operational resilience.

Show More Details

Darktrace is a Cambridge, UK-based firm concentrating on the mitigation of cyber disruptions globally. The company employs a unique AI technology used by thousands of businesses globally to counteract, identify, react to, and recover from cyber-attacks. With a team of over 2200 people spread over 30 global offices, Darktrace is dedicated to containing the global impacts of cyber threats.

Show More Details

Claroty provides a cyber-physical systems (CPS) protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership. The company is headquartered in New York City with a presence in EMEA, Asia-Pacific, and the Americas.

Show More Details

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details

Zscaler is a globally recognized company that specializes in securing network and application transformations for mobile and cloud based platforms of major organizations. The primary services it offers are Zscaler Internet Access and Zscaler Private Access. These services are developed to create rapid, robust links between users and applications, independent of the device, location, or network. Fully delivered through cloud, Zscaler services aim to provide simplicity, enhanced cybersecurity, and better user experience which can be a challenge for traditional appliances or hybrid solutions. Functioning in over 185 countries, Zscaler operates a vast cloud security platform to protect numerous enterprises and governmental agencies from cyber threats and potential data loss.

Show More Details

SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.

Show More Details

FireMon is centered on enhancing security operations to achieve improved security results. The company provides superior security policy management, cloud security operations, and cybersecurity asset management solutions to enterprises globally. The security policy management platform created by FireMon is a real-time solution addressing firewall and cloud security policy-related risks, undertaking policy changes, and imposing compliance. Besides, FireMon's DisruptOps is a distributed cloud security operations solution capable of detecting and responding to issues in dynamic public cloud environments. The firm also offers Lumeta, a cloud-based cybersecurity asset management solution that has the capability to scan an entire enterprise infrastructure and provide insights into the network's interconnectivity.

Show More Details

Waterfall Security Solutions is an industrial cybersecurity company, protecting critical industrial networks since 2007. Our mission is to revolutionize how entire industries protect physical assets and industrial processes from cyber attacks. Waterfall’s patented, unidirectional products enable safe IT/OT integration, remote monitoring and diagnostics, cloud connectivity and tamper-proof forensics, without the vulnerabilities that always accompany firewalled connectivity. Waterfall has a growing list of customers worldwide in power plants, nuclear plants, on/off-shore platforms, refineries, rails, manufacturing plants, utility companies, plus more. Waterfall products support the widest range of industrial and remote monitoring platforms, applications, databases and protocols in the market. Waterfall products are widely recognized as simplifying compliance with security regulations, standards and best practices.

Show More Details

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details

Armis, the asset intelligence cybersecurity company, protects the entire attack surface and manages the organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less world Armis ensures that organizations continuously see, protect and manage all critical assets. Armis secures Fortune 100, 200 and 500 companies as well as national governments, state and local entities to help keep critical infrastructure, economies and society safe and secure 24/7. Armis is a privately held company headquartered in California.

Show More Details

Dragos is a company dedicated to industrial cybersecurity, focusing on the protection of critical infrastructure. The Dragos Platform provides technology that enables visibility into Industrial Control Systems/Operational Technology (ICS/OT) assets, vulnerabilities, threats, and mitigation strategies. This platform supports a broad range of industries such as electric, oil and gas, manufacturing, chemical, government sectors and more. The company's strength lies in its capacity to incorporate its comprehensive OT threat intelligence and insights from the service team into the software. Dragos maintains a worldwide presence, with its main operations based in the Washington, DC area, and regional operations in Canada, Australia, New Zealand, Europe, and the Middle East.

Show More Details

At Forescout, we envision a world where every cyber asset is seen, secure and compliant. We are a global provider of cybersecurity solutions that continuously identify, protect and help ensure the compliance of all managed and unmanaged cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout Platform delivers comprehensive capabilities for network security, risk and exposure management, and threat detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, we enable customers to manage cyber risk and mitigate threats more effectively.

Show More Details

Fortanix operates in the sphere of multi-cloud security with a central focus on Confidential Computing. The company's primary business problem is the challenge of securing sensitive data that is dispersed across different platforms such as clouds, SaaS, applications, storage systems, and data centers. Fortanix tackles this by decoupling security from the infrastructure. This allows it to provide effective solutions for the security of sensitive data through all stages - be it at-rest, in-motion, or in-use. In addition to this, Fortanix is a crucial part of the Confidential Computing Consortium.

Show More Details

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details

Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe.

Show More Details

Thales is a worldwide entity focusing on digital security. The company's main objective is to provide trust in an ever-increasing digitally interconnected society. To achieve this, Thales has developed a variety of products, software, and services that hinge on two foundational technologies: digital identification and data security. These technologies play a crucial role in various aspects of contemporary life such as payment methods, enterprise security, and the internet of things. The purpose of the technology is to assist in delivering digital services securely for a multitude of individuals and things.

Show More Details