Support
Glossary

Key Terms in OT Cybersecurity

About this Glossary

This glossary defines key terms used in operational technology (OT) cybersecurity, including how Industrial Defender approaches and applies these concepts. Terms are grouped by theme to make it easier to understand how similar ideas relate to each other, especially where definitions often overlap in industry conversations.

I already purchased a passive inventory solution. How is ID different?
How is compliance reporting with Industrial Defender different?
I run our SOC. What does ID do for me?
Is this a point solution for OT?
Do you have an API?
Can ID integrate with my enterprise CMDB?
I have Qualys and Nessus, why would I need another vulnerability management platform?
Will I be able to show my SOC team that our OT systems are secure, without giving them access?
How can I position the solution to get buy in from the executive team?
I just need a portion of the ID platform. Do I have to buy the whole thing?
Can I run your product on prem? In the cloud?
What resources do I need to deploy ID?
OT Security
ICS Security (Industrial Control Systems Security)
SCADA Security (Supervisory Control and Data Acquisition Security)
How They Compare

Visibility, Inventory, and Asset Context

OT Asset Management
OT Visibility

Cyber-Physical and Facility-Level Security

Cyber-Physical Security
Building Management System (BMS) Security
How They Compare

Connected Devices: IoT, IIoT, and IoMT

IoT (Internet of Things)
IIoT (Industrial Internet of Things)
IoMT (Internet of Medical Things)
How They Compare

Foundational Context: Critical Infrastructure

Critical Infrastructure