Plant and manufacturing operations that rely on operational technology (OT) are increasingly finding themselves in the cross hairs of cyberattacks. Nearly three-quarters of OT organizations experienced at least one malware intrusion in the past year.1 As they work to thwart these attacks by improving the security of plant and manufacturing operations, organizations that rely on OT technologies should evaluate prospective security solutions using several key criteria.

    Please prove you are human by selecting the flag.

    To begin, plant and manufacturing operations leaders need to be sure their security technologies effectively control network access, while preventing lateral movement among and between network segments. Second, they should look for security solutions that integrate to eliminate information silos and reduce the amount of staff time that security management consumes. Third, they need to make sure that every solution on their shortlist is specifically designed to support the protocols and capabilities utilized in their plant operations and manufacturing environment.