Support
Solution by Type: Asset Management

OT Asset Management for Critical Infrastructure

Identify, monitor and manage your operational technology asset and security data at scale with a single platform.

What Is OT Asset Management (OTAM)?

“The ability for organizations to properly and consistently identify and consistently manage data, personnel, devices, systems, and facilities based on their relative importance to provide the foundational capability to support an organizational cybersecurity program.” *

* NIST 800-82 SpecialPublication, Revision 3, Guide to Operational Technology Security , InitialPublic Draft” NIST, April 2022

Why Is OT Asset Management Important?

To ensure the safety of their employees and the public, create an effective cybersecurity program, and prepare for future regulatory requirements, critical infrastructure organizations must build a future-proof foundation by identifying, monitoring and managing changes for every OT asset in their infrastructure.

Safety

In OT environments, digital assets impact the physical world. OT asset management helps ensure safety if an unintended or unauthorized change occurs in a device or system.

Security

Accurate asset data and security baselines are the foundation of a strong cybersecurity program. Historizing asset changes also provides a template for backup and recovery if an incident does occur.

Compliance

Having an OT asset management foundation in place helps you prepare for future compliance regulations that could affect your industry.

Benefits of Our OT Asset Management Solution

Create an efficient configuration and change management process

Reduce MTTR

Enable ongoing vulnerability and patch management

Support more comprehensive risk assessments and mitigations

Build a single source of truth for maintenance efficiency

Establish a backup and recovery foundation

Watch Demo Video

An OT Asset Management Solution for the Future

Security teams need an automated approach to identify, monitor and manage every asset and document appropriate changes. Industrial Defender provides a single source of truth for your asset base that includes configuration and change management and enables a centralized cybersecurity program that can include vulnerability and patch management, version control, security baselines, risk assessments, incident response and compliance reporting.

For effective OT asset management, teams need access to four sources of data: physical inspection information, passive monitoring methods, configuration analysis and active discovery techniques. Industrial Defender leverages all four of these methods in one UI.

As a single platform for OT cyber risk management, we take you beyond visibility to help you manage your asset and security data.

Device Configuration Data

  • Device name, type, IP address, MAC address
  • Installed firmware and software inventory, including versions
  • OS, including vulnerabilities and patches installed
  • Open ports and services
  • Policies modified
  • Removable media installed
  • Malicious code detected/AV
  • Failure of event logging
  • Serial number
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

System Access & Authentication

  • Successful and failed login attempts
  • Generic and shared user accounts
  • Local and A/D accounts
  • Password parameters and age
  • User account locked
  • Policies modified
  • Privilege raised
  • Failure of event logging
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

Firewall Information & Events

  • Firewall rules, including change detection
  • Blocked execution (packet)
  • Blocked unauthorized file
  • Policies modified
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

Asset Resource Utilization & Status

  • CPU usage over time
  • RAM usage over time
  • Disk space
  • Swap space
  • Connectivity lost
  • Shutdown
  • Rebooted and boot checksum
  • Backup failure
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.
Illuminate

Discover our OT Asset Visibility Solution

Get a personalized demonstration of what our solution can do for your team.

Learn more
Fortify

Learn more about our OT Asset Management

View videos of our solution based on your unique challenges.

Learn more

Explore More Resources

No items found.