Blog Articles
Die drei Trends für OT/ICS Asset Management in 2020
Viel ist passiert seitdem wir das erste reinrassige Asset Management System für die OT eingeführt haben, und 2019 war das Jahr mit der steilsten Lernkurve. In diesem Blogartikel beschreiben wir auf der Basis dieser Erfahrungen die wichtigsten Markttrends für 2020, und...
Three trends that will shape OT/ICS asset management in 2020
A lot has been going on since we have introduced the OT-BASE Asset Management Platform, and 2019 was the year with the steepest learning curve. In this blog article we discuss which market trends we see for 2020, and how they shape our product strategy and roadmap for...
The simple truth why ICS detection / passive scanning can’t scale
"Products from current leaders such as Claroty and Nozomi Networks, as well as CyberX, Indegy and about 15 other competitors, are not what ICS asset owners actually want or need. They (...) will only be accepted as a product offering for the next 1 – 3 years." So...
OT/ICS policy and governance in 2019: Three factors for success
OT security experts agree that without systematic security policy and governance, an organization will never achieve sustainability in their efforts to continuously raise the security bar. Yet the sad reality is that for the vast majority of organizations that do...
OT/ICS Asset Inventory using Elasticsearch
Elasticsearch can index all kinds of complex documents, so you may wonder if it can also be used as an asset inventory. The simple answer is: Yes, certainly. In this article we'll explain how you can replicate an inventory maintained in the OT-BASE Asset Management...
Indegy’s frivolous PLC version control patent
Last week OT detection vendor Indegy announced that they have been granted a patent by the U.S. Patent and Trademark Office for PLC version control. Yes, you heard that right: PLC version control, a technology that is around for approximately two decades, is now...
Why you shouldn’t go for automatic security updates of your OT/ICS infrastructure
Vulnerability management in ICS environments is making progress due to the availability of automated software and firmware inventories. Now once you have a good picture of the known vulnerabilities that affect your installed base, wouldn't it be a good idea to...
What does “insecure by design” actually mean for OT/ICS security?
One of the reasons why vulnerability and patch management is different in OT as compared to IT is the fact that the majority of OT products, technologies, and designs are insecure by design. If you are new to OT security, you might wonder what that actually means, and...
The five things you need to know about OT/ICS vulnerability and patch management
Vulnerability and patch management are getting traction in OT, so let's have a look at what they do, and what they don't do in 2019. 1. Technology has improved but is far from perfect In order to check which known vulnerabilities affect your installed base, you first...