Claroty
Reveal, Protect, and Manage OT, IoT, and IIoT Assets.
Garland Technology's TAPs and Aggregators Feed Claroty's Continuous Threat Detection to protect Industrial OT networks.
- Problem
- Solution
- Benefits
- ABOUT Claroty
Problem
Today’s industrial and critical infrastructure companies face a new cybersecurity reality. Modern security threats combined with the convergence of OT and IT environments have exposed architectural vulnerabilities, as these companies work to meet new regulatory requirements, standards and cybersecurity frameworks to combat these challenges.
Solution
The integration between Claroty and Garland Technology extracts operational technology (OT) baselines, events, and alerts identified by Claroty Continuous Threat Detection (CTD) from Garland Technology Network TAP packet visibility to provide a complete industrial cybersecurity. The joint solution includes OT visibility & asset management, network segmentation, threat & anomaly detection, vulnerability management, remote incident management and scalable data management & controls.
Effective industrial cybersecurity starts with knowing what needs to be secured. This solution arms you with this knowledge by accessing network packets in unique environments, providing complete visibility and contextualizing 100% of your network’s contents—including its invisible or poorly understood contents. The result is a centralized, easy-to-manage, and always up-to-date inventory of all OT, IoT, and IIoT assets, processes, and connectivity paths in your network, as well as definitive insight into what normal looks like.
Benefits
• Deliver complete visibility into previously invisible industrial networks.
• Continuously detect anomalies, known and emerging threats, and zero-day attacks.
• Automatically provide root-cause analysis and risk-based scoring for all alerts.
• More effectively detect, investigate, and respond to incidents that could potentially impact OT availability, reliability, and safety.
• Reduce network downtime and monitoring deployment time with easy plug and play options that do not require configuration
changes to existing infrastructure.
• Eliminate blind spots, improving real-time asset inventory and management.
• Improve and air gap tool performance by providing complete unidirectional packet visibility, while optimizing and aggregating traffic.
• Provide OT security tools packet visibility for legacy networks with unmanaged switches that can’t utilize SPAN.
About Claroty
Claroty is the industrial cybersecurity company. Trusted by the world’s largest enterprises, Claroty helps customers reveal, protect, and manage their OT, IoT, and IIoT assets. The company’s comprehensive platform connects seamlessly with customers’ existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote access—all with a significantly reduced total cost of ownership.
Claroty is backed and adopted by leading industrial automation vendors, with an expansive partner ecosystem and award-winning research team. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America, and deployments on all seven continents.
Visit Claroty at claroty.com.
How It Works
- Garland’s Network TAPs are connected between network appliances like switches, routers, firewalls, PLC, RCUs, etc. from any
IT and/or OT segment at each layer that needs to be monitored. The network TAP provides full-duplex copies of traffic directly to
monitoring tools and are typically used to overcome limitations that occur when SPAN (Mirror/switched port analyzer) ports are
used or not available. - To optimize traffic in distributed networks, Aggregator TAPs or PacketMAX™ packet brokers can aggregate multiple TAP or
SPAN links from various segments back to a centralized Claroty CTD sensor, providing the benefits of a network TAP including
unidirectional data diode protection. - Claroty’s CTD monitors all assets, communications, and processes within OT environments to generate a behavioral baseline that
characterizes legitimate traffic and helps weed out false positives for optimal OT threat detection.
.png?width=3059&height=1808&name=Industrial%20Topology(Claroty).png)