Resources

Handbooks

The OT Asset Inventory Handbook

This handbook is not another fluffy sales brochure. In it, we explain what is required to build
an enterprise-wide OT asset inventory, what it can be used for, and what you can expect to gain from it. As it turns out, a contextualized OT asset inventory is the foundation for multiple use cases in cyber security, engineering, and maintenance.

Get the Handbook

The OT Vulnerability Management Handbook

This handbook acts as a how-to guide for the implementation of an effective OT vulnerability management process that is repeatable and delivers measurable and meaningful reductions of the attack surface.

Get the Handbook

The OT Asset Management Handbook

You will learn about the foundation of OT asset management – a comprehensive automated OT asset inventory – and its major use cases in reducing cyber security vulnerabilities, address the business continuity risk that comes from OT product obsolescence, and leverage standard hardware and software configurations that can be audited easily. You will also learn how all these functions can be executed smoothly and without adding headcount by using a modern OT asset management tool.

Get the Handbook

The OT Asset Discovery Handbook

This handbook explains various alternatives for automatic discovery, all of which are used in real life today. We’ll check out passive sniffing as implemented in OT threat detection products, and active discovery as implemented in IT tools and in the OTbase OT asset management software. An understanding of the various technological approaches will help you make sense out of existing alternatives.

Get the Handbook

OT Asset Management Weekly Webcast

Join our OT asset management weekly webcast, every Tuesday at 9:30am ET on X, LinkedIn, and Youtube. Click the icons for direct links.

Sample episodes:

Latest Blog Posts

The big OT asset visibility misconception

You have heard it a dozen times: You cannot protect what you don’t see. You need asset visibility! Based on this trivial insight, OT security vendors usually explain how you can achieve such visibility with their products. Let’s check what that actually means in...

read more

Threat-centric vs. infrastructure-centric OT security

There are two general approaches to OT security. One approach is threat-centric and attempts to identify and eliminate cyber threats in OT networks. The other approach is infrastructure-centric and largely doesn’t care about threats. Instead, it attempts to create a...

read more

Compound OT security gains

Guess what, the biggest problem in OT security isn’t the ever changing threat landscape. It’s the inefficiency of popular OT security strategies and processes. Why inefficient? Simply because they don’t pay any long-term dividends. Your OT threat detection efforts...

read more

Videos

Check our Youtube channel. Sample videos:

Product Documentation

You can access the complete OTbase product documentation here.