ASSET MANAGEMENT FOR DIGITAL OPERATIONS TECHNOLOGY

OT-BASE is an asset management system for companies in manufacturing, energy, water, chemical and similar industries who are dissatisfied with using spreadsheets to inventory and manage their complex, mission-critical digital operations technology infrastructure.

BOOST ENGINEERING & MAINTENANCE PRODUCTIVITY WITH OT-BASE

THE PROPER TOOL FOR THE DIGITAL TRANSITION

WITHOUT OT-BASE:
Tool-centric workflow

Without OT Base

In most organizations, configuration details of mission-critical control networks, PLC configurations, software versions etc. are scattered across dispersed Excel spreadsheets, Visio diagrams, and wiring diagrams. Stored in different folders, on different servers, produced by different individuals, and locked in silos. Data entry is manual, resulting in incomplete and outdated information by default. This is the price of a tool-centric approach that relies on tools which just happened to be already there, not because they were suited for the purpose.

These tools were never designed to model complex digital control system infrastructures. They were picked many years ago when process networks were small and simple, and IIoT was never heard of.

WITH OT-BASE:
User-centric workflow

With OT Base

OT-BASE automatically discovers the identity and configuration of your digital OT devices and systems, and consolidates OT configuration details in a central CMDB, accessible by web browser and protected by access control.

With OT-BASE, you can access all relevant configuration data in seconds due to its user-centric approach that is built around OT workflows. Rather than locked in silos, hybrid data is organized around OT devices and systems. Access the information you need either from your desk or at a control system cabinet on a tablet computer. System details are no longer known only to individual engineers, but are available to every member on the team, turning everyone into an expert.

HARDWARE INVENTORY

Get a listing of all devices, both bare metal and virtualized, that can be filtered by location, device category, IP address and more. Get a listing of all devices of a specific make and model. Get statistics on device type or product distribution.

SOFTWARE INVENTORY

Get a listing of operating systems, software applications, hotfixes, and firmware along with exact version numbers. Get a listing of all software installations for a specific product and version, along with license keys. Check easily where certain hotfixes aren’t installed by using configuration baselines.

NETWORK TOPOLOGY

Get accurate and complete interactive network diagrams which allow you to drill down into device configurations and subnets. Focus on layer 2 or layer 3 information by selectively enabling or disabling certain types of metadata.

DEVICE AND SYSTEM PROFILES

Get automatically generated device and system profiles which can be enriched with metadata and file attachments. Retrieve all relevant configuration data within seconds. Print out or save as PDF.

CHANGE MANAGEMENT

Plan and monitor configuration change with a straightforward workflow. Check configuration change, no matter if planned or unauthorized, by using a change history that is automatically maintained for every device. Verify configuration integrity and detect configuration drift by comparing against approved system configurations. Automatically detect silent installs.

PROBLEM MANAGEMENT

Log known problems such as hardware issues or software incompatibilities for individual devices or hardware and software products in a searchable database. Eliminate the risk of running into problems which have already been identified by others. Become aware of known problems of certain devices, systems and products right away.

DATA FLOW MAPPING AND ANALYSIS

Get a realistic picture of the de-facto data flow in your mission-critical networks. Validate protocols and endpoints for actually intended vs. unauthorized traffic. Get alerts on unauthorized data flow. Automatically visualize data flow in interactive UML diagrams. Get an automated impact analysis based on data flow.

COLLABORATION AND ACCESS CONTROL

Allow access to the asset management system for various user roles and third parties such as contractors, vendors, and consultants with user-definable roles and scopes. Assure that users can only see those parts of your OT infrastructure that they are entitled to.

Configuration Auto-Discovery and MONITORING

OT-BASE comes with software to automatically discover your network topology, device identity, hardware and software configuration, and data flow. OT-BASE features a hybrid mix of passive and active discovery methods that you can fine-tune to your needs. Dedicated SPAN ports and a discovery network are not required, and neither are expensive proprietary appliances.

Configuration auto-discovery isn’t just useful for initial CMDB population but also for continuous monitoring. This way OT-BASE can alert you about any unauthorized configuration change, catching well-intended silent installs as well as sophisticated cyber attacks.

Controlling what you already have isn’t enough — since the big wave of new digital devices is just in the planning stage, unaccessible for monitoring gear. For this reason, OT-BASE also gives you precision methods to specify digital reference architectures which can then be used in RFP specs, and can automatically be checked against configuration as commissioned.

Introducing the OT-BASE OT aSSET MANAGEMENT System