Indegy’s Take on Gartner’s Market Guide for Operational Technology Security 2017

Gartner Market Guide for Operational Technology

One of the biggest challenges facing the industry is deciding who is responsible for OT security - should it be the IT or OT teams?

 

The report points out a growing misconception that OT or IIoT (Industrial Internet of Things) security and security for the Internet of Things (IoT) are one and the same. As we know, they are not. IIOT security is focused on protecting control systems, devices and processes which include connected technologies like sensors and actuators.

 Gartner recently published the “Market Guide for Operational Technology Security”.

One of the report’s key takeaways is that translating IT security practices and copying IT security technology alone to address OT security do not result in a secure OT environment. Instead, OT-specific security solutions are needed to protect industrial control systems (ICS) and networks. For operators, fortunately, there’s good news.

How the Operational Technology Security Marketing is Evolving

The OT security market is maturing, products designed to address the specific requirements of OT environments, industrial platforms and networks, are becoming available. One of the leading OT security solutions is the Indegy Industrial Cyber Security Suite.

The report also points out a growing misconception that OT or IIoT (Industrial Internet of Things) security and security for the Internet of Things (IoT) are one and the same. As we know, they are not. IIOT security is focused on protecting control systems, devices and processes which include connected technologies like sensors and actuators.

IoT security, on the other hand, is about protecting the communications of a wide range of physical devices, including personal/consumer devices, vehicles, buildings, and other items, that are connected to the internet.

Gartner has identified seven categories that make up OT security, they are:

  • Asset discovery, visibility, profiling and tracking
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Endpoint-based security
  • IT/OT security or OT security consulting, integration and managed services (including cloud delivery)

What Challenges are Currently Facing the OT Security Industry?

One of the biggest challenges facing the industry is deciding who is responsible for OT security - should it be the IT or OT teams? Given their background and resources, in many cases IT security teams are being asked to take ownership of coordinating security for OT. However, they typically lack OT specific skills. 

According to Gartner, organizations should prioritize OT security requirements based on an integrated risk management strategy that spans both OT and IT systems.

One of the first steps in this process, from an OT standpoint, is conducting an inventory and assessment of assets to identify weaknesses associated with inadequate controls.

Here, a security solution that automatically maps out all control devices and provides visibility into activities that may change their configuration (like Indegy), is essential.

Indegy’s purpose-built Industrial Cyber Security Platform offers a comprehensive solution to protect OT environments and address the requirements listed in Gartner’s Market Guide, including asset discovery and inventory management, real-time threat and anomaly detection, incident response and more. It also supports the organizational efforts to implement a risk management strategy that spans both OT and IT environments.

To learn more about the Indegy Platform contact us today.

Indegy Industrial Cyber Security
 

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy