The Real Problem
Secure OT - Separate IT from OT
Secure OT - Mindset
Secure OT - IoT (and IIoT) offers exponentially greater opportunities than those from the IT Revolution. But they also pose an even greater number of threats that are harder to combat and potentially much more dangerous.
The differences between IT (Information Technology) and OT (Operating Technology) is profound. OT is far more complex, has a much greater number of endpoints.
OT suffers from an massive legacy “inventory” that has accumulated, without standards, for almost 40 years. Protecting IT and OT that share wires is impossible if we attack the problem with an “IT mindset”, there needs to be a different approach.
Secure OT - Facts
Any unprotected device on the same wires as IT assets, creates a risk to both IT and OT from cross-over breaches.
Firewalls, VPNs and SDNs can be compromised because they rely on software alone. True segmentation, isolation and containment can only be achieved with “hardware”, leaving only two options:
Install additional separate wires for Operational Technologies or Implement hardware-based private networks like those used by the Intelligence Community and DoD.
Secure-IoT is based on the IC/DoD approach but customized and optimized for OT. We offer every enterprise and device OEM a fast, non-disruptive and inexpensive way to protect all of their assets, and it’s available today.
Secure OT - A Paradigm Shift
The real problem: Operating Technology (OT) are almost impossible to secure because of their number, complexity, age and diversity.
IT = 3 operating systems, endpoints are “current” and have IP addresses. IP addresses are easy to locate and pose little danger if they are cut off.
OT = 90,000 operating systems, up to 30 years old and harder to physically locate. Many are without IP addresses, and can pose threats alone and to other assets and/or people.
OT cannot be adequately protected with IT-centric systems, tools and approaches so a paradigm shift is required to deal with the problem of security.