RETURN ON INVESTMENT
Know and assess your OT threat surface with accurate asset visibility across all connected cyber-physical systems. Industrial OT Security combines machine learning (ML) with our App-ID™ and Device-ID™ technology and crowdsourced telemetry to quickly profile all OT, IT and IoT devices and assets, even those never seen before. Examples include critical OT assets such as Distributed Control Systems (DCS), Industrial Control Systems (ICS), Human-Machine Interfaces (HMI), Programmable Logic Controllers (PLC), Remote Terminal Units (RTU), supervisory control and data acquisition (SCADA) systems, historians, jump servers. It also protects common IoT devices such as security cameras, printers and HVAC systems. The AI/ML technology scales seamlessly with your network to discover assets passively and non-intrusively, and classifies assets to reveal their type, vendor, model, OS and 80+ unique attributes.
Protect your OT perimeter and assets through secure segmentation and Zero Trust access. Industrial OT Security enables the separation of your OT networks from corporate IT and internet, and further secures OT assets with zoning and fine-grained segmentation policies based on OT asset, protocol and risk context. These capabilities help to prevent lateral movement of threats across vulnerable assets per the IEC-62443 segmentation best practices standards. Industrial OT Security provides automated least-privilege access policy recommendations using ML-based visibility, contextual information and behavior profiling. In addition, automated security policies eliminate error-prone and time-consuming manual policy creation and scale easily across a set of assets with the same profile. With Palo Alto Networks Next-Generation Firewall, these policies are easily enforced using Device-ID. Or customers can enforce Industrial OT Security recommended policies with Network Access Control (NAC) solutions.
Eliminate implicit trust by continuously monitoring and validating the security posture of all OT assets. Industrial OT Security continuously assesses OT asset identity, risk posture, and behavior to detect and flag any segmentation breach or other security policy breaches. It also enables you to identify and stop unexpected or risky communications between ICS assets, for example across OT process hierarchy mapped to Purdue model levels.
Industrial OT Security prevents zero-day attacks with inline deep learning, asset behavior anomaly detection, and continuous assessment of ICS processes to ensure process integrity and safety across your cyber-physical systems. Only Industrial OT Security identifies 650+ OT-specific threat signatures and leverages our best-in-class advanced threat prevention capabilities to stop known and unknown threats from reaching your critical OT assets, networks and processes.
Industrial OT Security provides 15X faster deployment time than other OT security solutions, allowing your team to spend time on security, not setup. Using Industrial OT Security with the Palo Alto Networks ML-Powered NGFWs or Prisma Access, your infrastructure and security teams become OT asset-aware within minutes. Industrial OT Security eliminates OT asset blind spots across your existing IT and security solutions with playbook-driven, built-in integrations. Our simplified cloud delivery means the solution can be deployed across any architecture without requiring multiple sensors and network redesign.
UNIQUE OT PROFILES
OT/ICS APP IDS
OT Threat Signatures