No matter the industry-be it energy, manufacturing, transportation, communications, building management, healthcare, utilities, warehousing, or others-most operational technology (OT) environments now incorporate a mix of cyber-physical systems (CPS), smart building solutions, Internet of Things (IoT), Industrial IoT (IIoT), and Internet of Medical Things (IoMT) devices.
These systems have several things in common. First, they are increasingly digitally connected to the IT network and/or the Internet. Next, most are now being monitored and managed remotely. And lastly, a defining characteristic of such systems is that they interact directly with the physical world, including dangerous environments or critical infrastructure. And as more devices are connected to these systems, this attack surface becomes wider and more vulnerable.
As with IT networks, remaining secure requires OT networks and security to rapidly evolve to keep up with new threats and changing technology-particularly the need to connect every device. Traditionally, OT security has relied on obscurity because everything was air-gapped and nothing was connected to external systems. But this approach has changed rapidly over the last five years, resulting in nimbler, more responsive OT environments-and increased risk.
As a result, CISOs have begun taking on more responsibility for connecting and protecting OT networks, often by adopting an OT secure networking strategy. However, as OT security matures, CIOs are also taking on OT risk mitigation responsibility as they look to expand their security operations (SecOps) capabilities to include OT. But change doesn't stop there. The increased global pressure of regulation and compliance is forcing the entire C-suite to rapidly survey the evolving OT security space, looking for OT-specific solutions that work together as part of a platform. And because this market is new, it is quickly filling with unproven security start-ups, resulting in the same security sprawl, vendor overload, and siloed solutions that have plagued IT networks for years.
An OT security platform needs to secure devices, networks, and applications. But there are also some additional unique requirements across the OT security platform that need to be addressed, for example:
An OT security platform needs to protect devices, employee & supply chain access, application access, the IT/OT convergence and integrated into the wider ecosystem of vendors.
Perhaps the most visible area of OT security is Secure Networking as it enables OT systems to connect to the outside world. Some of these environments are quite harsh and so Fortinet offers a full range of hardened or rugged Firewalls, switches, access points and 5G extenders. And since its often hard to get agents on OT devices, physical microsegmentation within the network stack is offered across the entire stack.
With many more devices connecting to cloud applications, it is critical to secure application access. In addition, some sites cannot host a full security stack, hence FortiSASE can provide security in the cloud rather than on the devices themselves.
Most IT Information Security Systems do not understand an OT environment. They were designed originally to understand such devices and interactions with the physical world. Fortinet has added specific OT modules to IT SecOps products to work in an OT environment.
It's becoming more important to understand what each OT devices is, what is does, how it's connected, and what it can talk to. This allows a more efficient NAC and microsegmentation strategy to be applied. It also allows virtual patching to be deployed to protect against urgent vulnerabilities. FortiGuard OT virtual patching, devices detection and analytics is the most comprehensive in the industry.
The OT ecosystem can contain many different types of vendors. Fortinet's focus is on two main groups, the first being Industrial Automation companies. We have developed partnerships with these global OT organizations where long-term the functionality will be fully integrated or in effect become OT-native within the overall solution. The second set of partners focus on identification and threat analysis of the specific OT environments and provide this information to Fortinet via Fabric-Ready technology integrations to facilitate determining what to allow or block. These include Armis, Claroty, Dragos, Nozomi Networks, and more.
And, Fortinet continues to expand what already stands as the industry's most comprehensive OT security platform, with the following new capabilities releasing today:
Fortinet remains committed to continuing to enhance what is already the industry's most comprehensive OT security platform. Click here for more information about our platform and solutions.