Operational Technology Security Reviews and Ratings

What is Operational Technology Security?

Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.

Products In Operational Technology Security Market

"Engineer Goes Above and Beyond: Exceptional Support and Service"

The engineer providing service to us was prepared to answer all of our questions. Willing to assist us in every possible way (I can say he did over and above what we expected). He provided recommendations that were helpful. Provided a detailed report on the work outcome also giving direction on the way forward. We are truly happy with the service we received. He was very Efficient too...

Read reviews

"DarkTrace: A Hero that doesn't stop saving companies."

Darktrace is one of the most important implementations we've added to our infrastructure because of it's incredible pattern recognition, detection, and automation to threats that aren't easily recognizable without AI.

Read reviews

"A Deep Dive into Industrial Network Security Management."

Clarotys EMC is a great asset in the realm of industrial network security. Its ability to privide real-time visibility, centralize management, and deliver robust security make it a valuable choice for organizations looking to safeguard their critical infrastructure. While it may require a learning curve, the benefits in terms of network protection and compliance support far outweigh any initial challenges.

Read reviews

"Excellent product. Worth the price. "

Forticlient helps us give security to our company's network.

Read reviews

"This program makes a great effort to protect you at all times."

This program makes a great effort to protect you at all times, Symantec Endpoint Security is our first choice when it comes to security and cleanliness, once this software is implemented it cleans my entire system and my applications to have a better performance of them and reduce all kinds of threats that appear on the road, my experience has been very good.

Read reviews

"Thoroughly research and understand the product"

Beyondtrust Pam have provided an exceptional experience. I would highly recommend

Read reviews

""Attivo Network Threat Deception""

It provides extensive attack analysis and adequate visibility into attacker's lateral movement.

Read reviews

"Powerful threat detection Zscaler tool!"

I'm very happy by using this product which work on the principle of threat detection.

Read reviews

"Good Solution for companies in the Operational Technology Domain"

Excellent Support provided during and post implementation.

Read reviews

"Immediate alerts for the business in case of any data breach"

The tool brings immediate alerts for the security team in case of any data breach happens. Overall the tool is powerful and can accommodate a lot of threats which might go unnoticed usually.

Read reviews

"Check Point Advanced Endpoint Threat Detection Overall Review"

Checkpoint Advance Endpoint Threat Detection is a great tool and is use to secure the endpoints from any type of vulnerabilities and attack that can cause harm to our system. It is a single solution which provides feature likes threat removal, quarantine malicious file, stopping threats etc. It has good ability like prevention, detection and response for the malicious file and attack.

Read reviews

"Armis Centralizes Cyber Risk Overview for IT & OT"

Armis is a great platforms that helps centralize our cyber risk overall view for both IT & OT

Read reviews

"Excellent Platform for Threat Management"

Ultimate threat management and vulnerability management platform for OT /IT environment

Read reviews

"Checkpoint master of convergence between IT and OT systems."

Have been using Checkpoint as the primary firewall to segregate the IT and OT networks.

Read reviews

"I`m security engineer and this product is helping us with wired wireless security."

Amazing product, which helps a lot with security and endpoint visibility of company network.

Read reviews

"Qualitative solution with Excellent capabilities and Customer support"

Fortanix DSM is a great solution for Encryption key management and Cloud Data Security.

Read reviews

"HSM's for Cryptographic Keys Security "

Network Attached HSM (Gemalto/Thales) is best in class for protecting the crypto keys. Storage and Generation for (Online & Offline) certificate authority keys-PKI.

Read reviews

"OT Security monitoring and more in weeks, not months or years! Quick results"

Excellent experience from the POV/POC. Always available, methodical and professional to have an efficient product testing experience. Easy and understandable installation and configuration of the product. Very robust and mature, providing you with significant information in a short time, unlike other products that require a long period of design, installation and configuration that can take months or even years.

Read reviews

"Good "

Cyberx made our job easier. Now more visible out Ot Network side. It's easy to use and has good monitoring solutions. We are quite satisfied

Read reviews

"Harmony Endpoint: Protecting against ransomware with private technology for backups"

Harmony Endpoint has a big granularity in the policies that allows administrators to separate groups of assets with different restrictions. By default it is quite prohibitive so it is ideal to implement it at the beginning of an organization in order to debug and adjust it.

Read reviews
Products 1 - 20