While organizations make a great effort to secure the computers, servers, users, cloud apps, and the like secure from cyberattacks, operational technology (OT) security has often been left as a nice to have, not for lack of wanting, but for the perceived complexity associated with keeping turbines, power plants, robotics, and more secure.
For many security teams, taking on OT security on top of their current workloads is a non-starter. Stellar Cyber recognized this challenge and developed its security platform to enable any security team to simultaneously secure traditional IT and OT environments in the same platform without adding resources.
Common OT Security Use Cases
Process / Port / Data Transfer
IT to OT
OT Security Speciﬁc Features
3700 total protocols, 57 SCADA (includes ICCP and DNP3), 18 IoT supported out of the box.
Real-time updates from paid signatures and over-the-wire file reconstruction and classification.
Ability to collect logs from all sources within DMZ (for example, Windows jump host, Zero Trust Solution).
Detecting threats on the network using supervised and unsupervised learning.
Discover assets and resolution from all data sources.
Third party vulnerability management sensors can be installed on a Security Sensor (for example, Tenable).
Level 3 Device Log Collection
Ability to collect logs from all sources within Level 3 (for example, Engineering Workstation, Remote Access Server).
OT Product Log Collection
Ability to collect logs from OT security products (for example, Nozomi) and OT devices (for example, Honeywell).
Flexible Deployment Options
Allows immediate deployment and future-proofing to new security demands.