6578bdef9806f4001eaf30ce Cybersecurity Cast Of Supplier Characters

Cybersecurity cast of supplier characters

Dec. 13, 2023
A sampling of some cybersecurity vendors and their solutions

There’s an endlessly shifting kaleidoscope of cybersecurity vendors and products, but “you can’t tell the players without a program,” so here are a few of the most recent:  

• Acronis offers Cyber Protect and Cyber Protect Cloud for zero-day malware and ransomware protection, backup, disaster recovery and forensic investigations.

Cisco’s Secure Equipment Access software provides remote access to ICS and OT assets, and lets users enforce cybersecurity controls at scale with zero-trust network access (ZTNA) for industrial networks and harsh environments.

Claroty’s Secure Remote Access (SRA) delivers frictionless, reliable, and secure remote access to industrial environments for internal and third-party users.

Crowdstrike and its Falcon software series deliver a unified platform approach to cybersecurity.

Dragos’ OT cybersecurity platform codifies threat intelligence and insights from its team of ICS/OT practitioners.

Fortinet’s FortiOS, operating system merges networking and security, and serves the foundation of its Security Fabric software.

Industrial Defender’s scalable platform gives users actionable data from their OT and IIoT infrastructure, enabling them to make informed risk management decisions, and manage their OT cybersecurity on one dashboard.

• Mission Secure’s technology and managed services protect  assets with device and network visibility, anomaly and threat detection, policy enforcement and signal integrity validation.

Nozomi Networks offers Vantage, Guadian, Arc and other cybersecurity software platforms and services for OT and IoT applications.

Otorio lets users achieve an integrated, holistic security strategy for ICSs and cyber-physical systems (CPS).

Owl Cyber Defense and its cross-domain, data diodes and portable-media solutions provide network security checkpoints for threat prevention and secure data availability.

Waterfall’s IT/OT integration technologies, such as its unidirectional gateways, guarantee safe, secure and reliable operations

Wireshark and its network protocol analyzer lets users see what’s happening on their networks.

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...