Support
OT Asset Management

OT Asset Management for Critical Infrastructure

Identify, monitor and manage your operational technology asset and security data at scale with a single platform.

Request Demo

What is OT Asset Management (OTAM)?

OT asset management goes beyond basic network visibility to deliver a true, continuously updated inventory of every device, system, and configuration in your industrial environment. Knowing that something is “on the network” is not the same as knowing exactly what it is, how it is configured, and what risk it introduces. This accurate, detailed asset intelligence sets the stage for effective monitoring, vulnerability management, and incident response, so when you see suspicious activity, you know exactly what you are dealing with and how to take action.

The ability for organizations to properly and consistently identify and consistently manage data, personnel, devices, systems, and facilities based on their relative importance to provide the foundational capability to support an organizational cybersecurity program.” *

*
NIST 800-82 Special Publication, Revision 3, Guide to Operational Technology Security, Initial Public Draft - NIST, April 2022
Our Approach

Why Choose OT Asset Management from Industrial Defender?

Create an efficient configuration and change management process
Reduce MTTR
Enable ongoing vulnerability and patch management
Support more comprehensive risk assessments and mitigations
Build a single source of truth for maintenance efficiency
Establish a backup and recovery foundation
Our Approach

Why Is OT Asset Management Important?

To ensure the safety of their employees and the public, create an effective cybersecurity program, and prepare for future regulatory requirements, critical infrastructure organizations must build a future-proof foundation by identifying, monitoring and managing changes for every OT asset in their infrastructure.

Safety

In OT environments, digital assets impact the physical world. OT asset management helps ensure safety if an unintended or unauthorized change occurs in a device or system.

Security

Accurate asset data and security baselines are the foundation of a strong cybersecurity program. Historizing asset changes also provides a template for backup and recovery if an incident does occur.

Compliance

Having an OT asset management foundation in place helps you prepare for future compliance regulations that could affect your industry.

Our Approach

An OT Asset Management Solution for the Future.

Security teams need an automated approach to identify, monitor and manage every asset and document appropriate changes. Industrial Defender provides a single source of truth for your asset base that includes configuration and change management and enables a centralized cybersecurity program that can include vulnerability and patch management, version control, security baselines, risk assessments, incident response and compliance reporting.

For effective OT asset management, teams need access to four sources of data: physical inspection information, passive monitoring methods, configuration analysis and active discovery techniques. Industrial Defender leverages all four of these methods in one UI.

As a single platform for OT cyber risk management, we take you beyond visibility to help you manage your asset and security data.

Device Configuration Data

  • Device name, type, IP address, MAC address
  • Installed firmware and software inventory, including versions
  • OS, including vulnerabilities and patches installed
  • Open ports and services
  • Policies modified
  • Removable media installed
  • Malicious code detected/AV
  • Failure of event logging
  • Serial number

System Access & Authentication

  • Successful and failed login attempts
  • Generic and shared user accounts
  • Local and A/D accounts
  • Password parameters and age
  • User account locked
  • Policies modified
  • Privilege raised
  • Failure of event logging

Firewall Information & Events

  • Firewall rules, including change detection
  • Blocked execution (packet)
  • Blocked unauthorized file
  • Policies modified

Asset Resource Utilization & Status

  • CPU usage over time
  • RAM usage over time
  • Disk space
  • Swap space
  • Connectivity lost
  • Shutdown
  • Rebooted and boot checksum
  • Backup failure
Speak With an Expert

Demo Request

Set up some time with one of our experts to see how our OT cyber risk management platform can help solve your unique security needs. Our solution can help you with:

Asset Visibility & Management
Vulnerability Management
IT/OT Collaboration
Compliance Reporting