Support
OT Asset Management

OT Asset Management for Critical Infrastructure

Identify, monitor and manage your operational technology asset and security data at scale with a single platform.

Learn More

What is OT Asset Management (OTAM)?

The ability for organizations to properly and consistently identify and consistently manage data, personnel, devices, systems, and facilities based on their relative importance to provide the foundational capability to support an organizational cybersecurity program.” *

*
NIST 800-82 Special Publication, Revision 3, Guide to Operational Technology Security, Initial Public Draft - NIST, April 2022

Why Is OT Asset Management Important?

To ensure the safety of their employees and the public, create an effective cybersecurity program, and prepare for future regulatory requirements, critical infrastructure organizations must build a future-proof foundation by identifying, monitoring and managing changes for every OT asset in their infrastructure.

Safety

In OT environments, digital assets impact the physical world. OT asset management helps ensure safety if an unintended or unauthorized change occurs in a device or system.

Security

Accurate asset data and security baselines are the foundation of a strong cybersecurity program. Historizing asset changes also provides a template for backup and recovery if an incident does occur.

Compliance

Having an OT asset management foundation in place helps you prepare for future compliance regulations that could affect your industry.

Our Approach

An OT Asset Management Solution for the Future.

Security teams need an automated approach to identify, monitor and manage every asset and document appropriate changes. Industrial Defender provides a single source of truth for your asset base that includes configuration and change management and enables a centralized cybersecurity program that can include vulnerability and patch management, version control, security baselines, risk assessments, incident response and compliance reporting.

For effective OT asset management, teams need access to four sources of data: physical inspection information, passive monitoring methods, configuration analysis and active discovery techniques. Industrial Defender leverages all four of these methods in one UI.

As a single platform for OT cyber risk management, we take you beyond visibility to help you manage your asset and security data.

Device Configuration Data

  • Device name, type, IP address, MAC address
  • Installed firmware and software inventory, including versions
  • OS, including vulnerabilities and patches installed
  • Open ports and services
  • Policies modified
  • Removable media installed
  • Malicious code detected/AV
  • Failure of event logging
  • Serial number