This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) Français (French) Deutsch (German) 日本語 (Japanese) 한국어 (Korean) Español (Spanish) Italiano (Italian)
As the Senior Vice President of Network Security at Palo Alto Networks, I get to talk to hundreds of customers every year about their cybersecurity challenges. One of the most interesting trends I’ve seen over the past few years is how different industries develop different cyber security needs as their digital transformations accelerate. One set of verticals that has a unique set of needs and a unique impact on the world is the OT industries that comprise a large part of our critical infrastructure.
When I talk to these customers in verticals, like manufacturing, electric utilities and logistics, they tell me that they need the type of best-in-class security that Palo Alto Networks provides. But, that’s not where the conversation ends. These companies put maximum emphasis on achieving zero operational downtime in parallel with great security. When their operations go down, so does their bottom line. More than that, when their operations go down, it can have a meaningful impact on the safety of workers, customers and the general population.
Today, I’m excited to share that Palo Alto Networks has released a new solution designed for the unique needs of these asset intensive industries. Zero Trust OT Security is built to provide comprehensive visibility and security for OT assets and networks, 5G connected assets and remote operations. We shared our new solution with the experts at the Enterprise Strategy Group and they provided their feedback:
“As industrial OT systems and IT systems become more interconnected, so does the size of the attack surface available to the adversary. Defending against increasingly sophisticated threats requires expanded security strategies that can provide visibility, granular context and Zero Trust capabilities across both OT and IT networks, devices, applications and users. The Palo Alto Networks solution embraces this unified security model, promising to help protect complex OT environments.” – Dave Gruber, Principal Analyst, Enterprise Strategy Group
Why is our solution based on Zero Trust? I wrote in depth about why Zero Trust is critical for critical infrastructure a couple of weeks ago. Let me highlight one point I made there:
“Zero Trust isn’t only about users: the same principles apply to cloud workloads and infrastructure components like OT devices or network nodes. There is still a need to authenticate devices and access to authorize what the device is trying to do and provide control, and that’s what the Zero Trust Model can provide.”
We are proud of the Zero Trust capabilities we deliver at Palo Alto Networks and are pleased to bring them even further into OT environments.
As part of our Zero Trust OT Security solution, I’m also excited to introduce a new security service – Industrial OT Security. Industrial OT Security provides ML-powered comprehensive visibility, security policy recommendations, best-in-class threat protection, and Zero Trust enforcement to secure your OT assets. It combines machine learning (ML) with crowdsourced telemetry to recognize hundreds of unique asset profiles, OT-specific threat signatures and over 1,000 OT/ICS/SCADA applications. A recent study by the Enterprise Security Group showed that Industrial OT Security can provide a return on investment (ROI) of 351% with up to 95% lower complexity than alternative products, while also reducing risk.
We have designed Zero Trust OT Security to enable both best-in-class security and superb operational up-time by focusing on three pillars:
By sticking to these three principles our solution delivers exactly what OT leaders need – Zero Trust security that keeps operations up 24/7, not CISOs.
Visit our solutions page for more resources and case studies on Zero Trust OT Security.
Learn more about how Industrial OT Security helps customers achieve a return on investment (ROI) of 351% with up to 95% lower complexity than alternative OT security solutions.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.