Operational technology (OT) is the use of hardware and software to monitor and control physical processes, devices, and infrastructure. Operational technology systems are found across a large range of asset-intensive sectors, performing a wide variety of tasks ranging from monitoring critical infrastructure (CI) to controlling robots on a manufacturing floor. OT is used in a variety of industries including manufacturing, oil and gas, electrical generation and distribution, aviation, maritime, rail, and utilities.

Gartner defines OT security as, “Practices and technologies used to (a) protect people, assets, and information, (b) monitor and/or control physical devices, processes and events, and (c) initiate state changes to enterprise OT systems.” OT security solutions include a wide range of security technologies from next-generation firewalls (NGFWs) to security information and event management (SIEM) systems to identity access and management, and much more.

Traditionally, OT cyber security was not necessary because OT systems were not connected to the internet. As such, they were not exposed to outside threats. As digital innovation (DI) initiatives expanded and IT OT networks converged, organizations tended to bolt-on specific point solutions to address specific issues. These approaches to OT security resulted in a complex network where solutions could not share information and provide full visibility.

Often, IT and OT networks are kept separate, duplicating security efforts and eschewing transparency. These IT OT networks cannot track what is happening throughout the attack surface. Typically, OT networks report to the COO and IT networks report to the CIO, resulting in two network security teams each protecting half of the total network. This can make it difficult to identify the boundaries of the attack surface because these disparate teams do not know what is attached to their own network. In addition to being difficult to efficiently manage, OT IT networks contain huge gaps in security.

Website: Fortinet Operational Technology Security

Securing the Industrial Sector with Fortinet Fabric for Operation Technologies (OT)

Antoine D’Haussy
BD SME Director EMEA for Operational Technology, Fortinet
Day 2 – 22 Oct:
1415 – 1440

Operational Technology - Addressing Advance Targeted Malware in a OT environment

Effective defense against advanced targeted attacks (example Industroyer, Triton, Stuxnet, etc) through a cohesive and extensible architecture working to protect OT networks such as Engineering workstation and Industrial Control System (ICS) devices against OT malwares.

Operational Technology - Securing OT Networks with Visibility, Microsegmentation & Virtual Patching

The FortiGate NGFW provides visibility to your OT environment with support for DPI for over 32 ICS/OT protocols with 1,500+ out-of-the-box application control signatures. FortiGate Industrial IPS signatures offer excellent virtual patching capabilities to protect against known threats leveraging existing vulnerabilities that were reported.

Fortinet Operational Technology Security

Hi , how can I help you?