Define: Operational technology?
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. The term has become established to demonstrate the technological and functional differences between traditional IT systems and Industrial Control Systems environment, the so-called “IT in the non-carpeted areas”. Examples of operational technology include:
- Computer Numerical Control (CNC) systems, including computerized machine tools
- Scientific equipment
- Building Management and Building Automation Systems, (BMS)/(BAS)
- Lighting controls both for internal and external applications
- Energy monitoring, security and safety systems for the built environment
- Transportation systems for the built environment
Top OT (Operational Technology) Security Companies and Solutions
This article showcases Threat.Technology’s top picks for the best OT (Operational Technology) Security solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Mocana is a developer of cybersecurity software solutions that protect Internet of Things (IoT) devices, operational technology, mission-critical systems, and industrial infrastructure. The company’s on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant.
Its tightly integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed.
It was established in 2002 and is headquartered in San Francisco, California.. .
Fortress Information Security, LLC
Fortress Information Security helps companies stop emerging cyber threats that pose the biggest risk to their business. Our clients benefit from a unique “Technology, Analytics and Services” (TAS) approach to protecting their connected assets.
Fortress has deep, combined expertise in both cyber security and specific industry sectors – like energy, manufacturing and finance – to provide solutions that specifically tie into the business processes of our clients. The centerpiece of our technology, the Fortress Platform, gives clients a “single source of truth” on emerging risk.
The Fortress Platform leverages automation, alerting, escalation and a variety of other advanced functions with service levels assigned whenever appropriate to ensure and measure execution and compliance. We take a holistic view of risks across our clients’ entire digital ecosystem of IT, operational technology (OT), third-parties and the extended supply chain to better prioritize and unlock value of existing technology investments.
By leveraging everything from risk assessments and security scoring models, to continuous monitoring of third-parties and system reviews from elite analyst teams, Fortress connects traditionally disparate sources of information to help clients uncover not just emerging cyber risks, but every ripple of business impact that flows from those risks. Fortress delivers what our clients need to enable their processes and be on path to security and regulatory compliance at a fraction of the time it would take the enterprise to learn about, compare, select and purchase new tools.
Check out our website to learn about all of our solutions including Third-Party Risk Management, Vulnerability Risk Management and Asset to Vendor Network for power utilities.. .
SecurityGate provides an integrated risk management platform designed specifically for operational technology (OT)/industrial control system (ICS) cybersecurity. The Software as a Service (SaaS) platform gives company leaders, governance risk and compliance departments, and IT teams unmatched visibility into OT/ICS environments.
The system uses intelligent systems to help CISOs understand business risk and build a strategy to mitigate the risk of cyber threats. Risk management teams use the platform to automate processes and speed up the time it typically takes to implement the prescribed tactics.
The company recently signed on Chevron, who joined ranks with other SecurityGate.io customers like Patterson UTI and Westlake Chemical.. .
Founded in Sugar Land, Texas in 2017, ThreatGEN delivers a solution to bridge “the Operational Technology (OT) Cybersecurity skills gap” utilizing its ThreatGEN® Red vs. Blue and ThreatGEN Services.
ThreatGEN® Red vs. Blue training uses cutting-edge computer gamification to provide an exciting & modernized approach to OT cybersecurity training, both practical and cost effective! ThreatGEN Services are delivered worldwide by world-renowned OT cybersecurity experts (we literally wrote the books industry uses) using strategically chosen partnerships to create a holistic service offering..
Headquartered in Singapore, MicroSec (www.usec.io) is a deep technology cybersecurity company that combines cybersecurity, cryptography, and machine learning for government and industrial organizations to protect their operational technology infrastructure. MicroSec’s focus on enterprise-grade security capabilities for IoT devices along with lifecycle management includes a machine learning-based anomaly detection system that provides intelligent detection of tampering and misuse of devices.
With a seamless integration process, MicroSec is revolutionizing cybersecurity for Automotives, Smart City Infrastructures, and Industry 4.0.. .
NextNine is a leader in Operational Technology (OT) security management software for industrial and critical infrastructure, markets that are vulnerable to cyber security attacks and are underserved by conventional enterprise IT solutions. Using NextNine you can have centralized OT security management for your entire SCADA/ICS environment.
Distributed critical infrastructure plants and facilities with proprietary ICS/SCADA networks and devices, paired with the need for external vendors to provide remote maintenance and support, create an ideal target profile for hackers and terrorist attacks. Traditional IT security management solutions were designed to manage standard computing environments and cannot handle the proprietary processes, networks and devices of the ICS/SCADA world.
In contrast, NextNine has over 10 years of leadership in OT security, and has purpose-built its product to deal with these unique challenges. NextNine’s solution is an industrial strength software platform delivering robust, customizable and field proven OT security management.
Top tier critical infrastructure companies along with 5 of the 7 largest industrial vendors have standardized on NextNine. Today, the company has 6000 installations globally in fields such as oil, gas, mining, chemicals, energy, manufacturing, defense and critical infrastructure.
NextNine has been recognized by the White House for its leadership in the efforts to improve critical infrastructure cyber security. NextNine has received ISO/IEC 27001:2013 certification, assuring NextNine’s employees operate a comprehensive security program and manage information security risks effectively.
NextNine’s certificate is issued by the Standards Institution of Israel. The company was founded in 1998, is privately held and headquartered in New York..
Sheffield Scientific is a private, women owned company founded in May 2010 that provides professional consulting services to the energy industry, for project oversight/advisory services, business consulting & performance improvement/alignment, application conversion/upgrade and supporting technical services. Sheffield brings the latest, most up-to-date experience in both Industry Best Practices, Information Technology (IT), Operational Technology (OT), Security (Physical & Cyber), Communications and Applications.
Sheffield has a client/partner-centric philosophy that believes in delighting its customers by aligning value to their needs. We believe that our employees are our most important asset.
Its corporate office is in Houston, TX with satellite offices in Vancouver, WA and the United Kingdom.. .
Nation-E offers last mile cyber protection for critical infrastructure assets. Their solutions implement modern IT security approaches in the Operational Technology ecosystems in order to secure inherent system vulnerabilities and firmly protect against cyber-attacks targeting critical assets.
They focus on detection and mitigation of real-time breaches, while minimizing the operational and financial impact caused by malicious attacks. These solutions monitor Operational Technology traffic, applying behavioral analysis and anomaly detection of potential cyber threats, and offer risk mitigation via enforcing security policy, provide access control, and secure asset communications through authentication and encryption.
Nation’E’s Cerebrum detects and reports tampering, traffic abnormalities or behavioral deviations from a stated policy, provides immediate alerts on communication disruptions, allows incident response and assets isolation using Nation-E policy management. Cerebrum integrates with multiple 3rd-party incident response systems including the most common SIEM systems from IBM, Checkpoint and HP.
Their products integrate with existing customer platforms, both modern and legacy, as well as 3rd-party applications such as SCADA, Access Control, sensors and SIEMs.. .
Helping you protect and serve is their passion. Turn to LEA-AID for the specialized covert equipment, operational technology and logistical services you need to meet your mission goals and department objectives.
Here at LEA-AID, they understand the critical nature of your work and recognize that reliability is vital. Police departments, defense contractors, military agencies, security personnel and more rely on LEA-AID for the tools, technology, services and surveillance training required to create a secure environment while safeguarding the lives and property of the communities they serve.
They also offer a variety of contract vehicles, including a full GSA Schedule, to make it easy for federal, state and local agencies to work with us while staying within fixed budgets.. .
AlphaGuardian provides the only integrated systems to manage cybersecurity, physical security and operational analytics for any piece of infrastructure equipment. AlphaGuardian covers you from the small server and telecom room (RackGuardian) to the Network Edge (EdgeGuardian) to the Data Center, Plant and Office Building (CyberGuardian).
No other company offers protection with this scope against cyber, physical, and operational problems in your operational technology systems. Cyber hackers are locked out by its one-way data diode architecture.
Physical Security is protected by their unique Tamper Analytics and Operational Security is made possible by their unique Alarm Analytics. Give us a call to see how AlphaGuardian can help you today..
ESICONVERGENT is your trusted advisor for all your security challenges in this ever changing world. Through our eco system of consultants and companies ESICONVERGENT has brought together the best of breed to give you the customer the most comprehensive and precise fulfillment of all your regional and global security needs.
For many years security has been either treated as a cost center or a necessary evil and has not been fully integrated into the life blood of the business risk environment. Through ESICONVERGENT methodology of brining Information Technology, Operational Technology, and Physical Security together thru the convergence of people, process, and technology we have found the missing piece in making good security decisions.
It starts with an evaluation by our staff of seasoned and experienced consultants who have industry as well as practical experience in every aspect of security.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.