×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

How CyberArk Can Help Secure Operational Technologies

December 18, 2019

For decades, Operational Technology (OT) devices and environments were not connected to other systems or the Internet. They were physically separated from other networks within industrial organizations, a practice known as “air gapping”. The critical nature of industrial operations required OT device manufacturers to focus on system availability and interoperability but not necessarily on security; so this “air gap” practice became the main security feature that protected critical systems from outside intrusions or cyber-attacks. The obscurity of these systems, which rely on unique, proprietary equipment and communication protocols, contributed to the idea that built-in security was not really needed.

Previous Whitepaper
Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials
Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials

This CISO View research report draws from the experiences of security professionals and technical experts w...

Next Whitepaper
CyberArk Labs: Ransomware
CyberArk Labs: Ransomware

Based on testing by CyberArk Labs, the removal of local administrator rights combined with application cont...