Resources
Handbooks

The OT Asset Inventory Handbook
This handbook is not another fluffy sales brochure. In it, we explain what is required to build
an enterprise-wide OT asset inventory, what it can be used for, and what you can expect to gain from it. As it turns out, a contextualized OT asset inventory is the foundation for multiple use cases in cyber security, engineering, and maintenance.

The OT Vulnerability Management Handbook
This handbook acts as a how-to guide for the implementation of an effective OT vulnerability management process that is repeatable and delivers measurable and meaningful reductions of the attack surface.

The OT Asset Management Handbook
You will learn about the foundation of OT asset management – a comprehensive automated OT asset inventory – and its major use cases in reducing cyber security vulnerabilities, address the business continuity risk that comes from OT product obsolescence, and leverage standard hardware and software configurations that can be audited easily. You will also learn how all these functions can be executed smoothly and without adding headcount by using a modern OT asset management tool.

The OT Asset Discovery Handbook
This handbook explains various alternatives for automatic discovery, all of which are used in real life today. We’ll check out passive sniffing as implemented in OT threat detection products, and active discovery as implemented in IT tools and in the OTbase OT asset management software. An understanding of the various technological approaches will help you make sense out of existing alternatives.
OT Asset Management Weekly Webcast
Join our OT asset management weekly webcast, every Tuesday at 9:30am ET on X, LinkedIn, and Youtube. Click the icons for direct links.
Sample episodes:
Latest Blog Posts
OT asset inventory made easy
By Walt Boyes This is part of a blog series. Please read Part I and Part II here. When last we left our hero, he was juggling maintenance issues and cybersecurity, and trying to create an OT asset inventory with Excel and SQL. He bought and installed an ICS...
Contextual metadata ties technical OT asset information to use cases
By Walt Boyes This is part of a blog series. Please read Part I here. Our hero has been trying his very best to follow rule number one: you cannot measure what you cannot see, and you cannot protect it either. Unfortunately, and as you might expect if you have been...
Why manual OT asset inventories don’t work
By Walt Boyes When we last saw our intrepid maintenance lead cybersecurity chief, he was waking up in the middle of the night from dreams of being the little Dutch boy with his fingers in the dike. Now, his manager has told him that because of the worsening economic...
Product Documentation
You can access the complete OTbase product documentation here.