CIO Influence
CIO Influence News Security

Stellar Cyber’s Open XDR Platform Now Secures OT Environments

Stellar Cyber’s Open XDR Platform Now Secures OT Environments

Security teams can now combat IT and OT breaches from a single unified platform without being experts in OT security

Stellar Cyber, the innovator of Open XDR technology, announced that all Stellar Cyber Open XDR Platform users can now secure their OT environments on the same platform with the same license they use to secure their IT environments. Combining IT and OT security in a single platform gives security teams a permanent advantage over attackers who frequently attempt to exploit weaknesses and vulnerabilities identified in an IT environment to move laterally into an OT environment to carry out an attack, and vice versa.

CIO INFLUENCE: World Password Day: Password advice for CIOs

“With attacks so prevalent, you would think most security vendors would attempt to provide an easy-to-implement OT security solution, but that is not the case”

Recent studies found that in 2021, over 90% of manufacturers had their production or energy supply impacted by a cyberattack. “With attacks so prevalent, you would think most security vendors would attempt to provide an easy-to-implement OT security solution, but that is not the case,” said Sam Jones, VP of Product Management at Stellar Cyber. “We found that with our open data architecture and built-in network security (NDR) capabilities, we can detect the most common OT environment cyber-attacks without burdening the security team to create OT-specific detection content.”

OT environments require different deployment models based on their OT architecture. Stellar Cyber’s agentless deployment and its partnership with Garland Technology (a leading provider of network visibility products), make it easy for customers to incorporate their OT environment assets into the Stellar Cyber platform.

With Stellar Cyber, security teams can now automatically detect the following:

  • Many flavors of SCADA protocols
  • SCADA network segmentation violations
  • Network attacks
  • Malicious or suspicious file transfers
  • Anomalous communication
  • IT-to-OT breaches

CIO INFLUENCE: JFrog Software Supply Chain Platform Delivers 393% ROI According to Total Economic Impact Study

Several existing Stellar Cyber customers are already incorporating their OT environment assets into the Stellar Cyber Platform and gaining never-before-seen insights into the attacks targeting their OT environments. “Securing my OT environment seemed unrealistic given my resources and budget, but now that I can use the Stellar Cyber Platform for both my IT and OT environments, my security team is delivering better security outcomes across the entire organization, protecting our bottom line,” said a SOC manager for a mid-sized manufacturing organization.

“Securing an OT environment should not be exclusively available to organizations that have embedded OT expertise in their security teams,” said Sam Jones, VP of Product Management of Stellar Cyber. “With our platform, all customers can now reduce the risk of a widespread breach that might bring the shop floor, a utility turbine, or a critical manufactory line offline.”

CIO INFLUENCE: CIO Influence Interview with Lior Yaari, CEO and Co-Founder at Grip Security

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

CoreSite Enhances Connectivity in Chicago with On-Net Access to Google Cloud Interconnect

Lookout Appoints Deborah Wolf as Chief Marketing Officer

Nokia Readies O-RAN Fronthaul With NTT DOCOMO For Multi-Vendor 5G Operation

CIO Influence News Desk