×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

How CyberArk Can Help Secure Operational Technologies

December 18, 2019

For decades, Operational Technology (OT) devices and environments were not connected to other systems or the Internet. They were physically separated from other networks within industrial organizations, a practice known as “air gapping”. The critical nature of industrial operations required OT device manufacturers to focus on system availability and interoperability but not necessarily on security; so this “air gap” practice became the main security feature that protected critical systems from outside intrusions or cyber-attacks. The obscurity of these systems, which rely on unique, proprietary equipment and communication protocols, contributed to the idea that built-in security was not really needed.

Previous Whitepaper
Buyer’s Checklist: Evaluating Your Control Over Identity and Privileged Access
Buyer’s Checklist: Evaluating Your Control Over Identity and Privileged Access

Are you securely managing privileged access in your organization? Use this checklist to identify where to f...

Next Whitepaper
CyberArk Labs: Ransomware
CyberArk Labs: Ransomware

Based on testing by CyberArk Labs, the removal of local administrator rights combined with application cont...