What to Expect
The intent is to provide a high-level overview of the most effective and prevalent methodologies, not an exhaustive analysis of features by each vendor, as these vary by category. This should be a starting point to guide you to where you need to dig deeper into cybersecurity solutions for your OT network.
- Perimeter Firewalls between IT and OT
- Network IDS/Anomaly Detection
- Configuration Change Management
- Remote Access
- Data Diodes
- Vulnerability Management
- Security Operations Center/Threat Hunting
- Traditional Network Segmentation
- Network Micro-Segmentation: Using Software-Defined Networking


