How CyberArk Can Help Secure Operational Technologies

December 18, 2019

For decades, Operational Technology (OT) devices and environments were not connected to other systems or the Internet. They were physically separated from other networks within industrial organizations, a practice known as “air gapping”. The critical nature of industrial operations required OT device manufacturers to focus on system availability and interoperability but not necessarily on security; so this “air gap” practice became the main security feature that protected critical systems from outside intrusions or cyber-attacks. The obscurity of these systems, which rely on unique, proprietary equipment and communication protocols, contributed to the idea that built-in security was not really needed.

Previous Article
Privileged Access Abuse at Heart of Latest Insider Threats
Privileged Access Abuse at Heart of Latest Insider Threats

While many companies spend a lot of energy protecting their business from external threats, security events...

Next Article
Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials
Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials

This CISO View research report draws from the experiences of security professionals and technical experts w...