<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">

Using OT Asset Visibility and Firewalls to Protect Industrial Operations

Implementing a defensible architecture is one of the SANS Institute's 5 Critical Controls, that organizations must consider. A defensible architecture reduces as much of the agreed-upon risk as possible through system design and implementation, while also simplifying the efforts of human defenders.  

Download this whitepaper, to review common attributes of good defensible architectures that include:

  • Achieving Accurate Asset Visibility for the Crown Jewels
  • Segmenting the Environment
  • Enabling Bi-Directional Communication When Required
  • Collecting Network Traffic and Logs from System of Value
  • Implementing a Defensible Cyber Position
  • Enhancing ICS/OT Security Perimeters: Improved Asset Visibility for Better Firewall Policy