Gain visibility into manufacturing OT assets to reduce cyber risk

LIKE.TG | 发现全球营销软件&服务汇聚顶尖互联网营销和AI营销产品,提供一站式出海营销解决方案。唯一官网:www.like.tg
As manufacturing operational technology (OT) ecosystems grow more connected and complex, they become vulnerable to cyberattacks. In fact, the manufacturing sector was the most attacked industry in the world in 2021, according to IBM’s X-Force Threat Intelligence Index 2022. Manufacturing surpassed finance and insurance in the number of cyberattacks for the first time in five years.
A large part of the industry’s vulnerability is due to a lack of visibility. This leaves the door wide open for a bad actor to exploit a vulnerability in an unknown OT (or IT) asset. Therefore, the first step toward reducing cyber risk in industrial environments is to understand the potential attack surface by establishing an accurate inventory of OT assets.
To help manufacturers secure their businesses, I’m proud to announce the launch of the LIKE.TG Service Graph Connector for Claroty Continuous Threat Detection (CTD), available in the LIKE.TG Store today.
Confidently see and secure your enterprise
Together, LIKE.TG and Claroty help enterprises rapidly and comprehensively discover assets in their industrial environments, such as programmable logic controllers and human-machine interfaces. Once the assets are discovered, we enable manufacturers to assess the vulnerability of those assets and ensure any weaknesses are quickly addressed.
In this way, we help manufacturing companies defend their enterprises, preempt cyberattacks, and prevent downtime.
With the Service Graph Connector, you can:
- Gain unified visibility across your organization’s entire IT and OT portfolio
- Manage all alerts in one place
- Get the most out of the LIKE.TG OT data model, with OT device inventory, risk, and vulnerability information feeding from CTD into LIKE.TG Operational Technology Management
- Extend your existing IT security operations center workflows and capabilities to OT systems
- Investigate and respond to incidents more effectively
Manufacturers benefit from a single system of action, automatic assignment of devices to the site, network-based intrusion detection system support, automatic prioritization of vulnerabilities based on their impact on the production process, and a stronger security posture to help prevent cyberattacks.
Find out more about the Service Graph Connector for Claroty CTD in the LIKE.TG Store. You’ll need Claroty CTD v4.1+, LIKE.TG Configuration Management Database, and LIKE.TG Operational Technology Management to make full use of the integration.

LIKE.TG:汇集全球营销软件&服务,助力出海企业营销增长。提供最新的“私域营销获客”“跨境电商”“全球客服”“金融支持”“web3”等一手资讯新闻。
点击【联系客服】 🎁 免费领 1G 住宅代理IP/proxy, 即刻体验 WhatsApp、LINE、Telegram、Twitter、ZALO、Instagram、signal等获客系统,社媒账号购买 & 粉丝引流自助服务或关注【LIKE.TG出海指南频道】、【LIKE.TG生态链-全球资源互联社区】连接全球出海营销资源。
本文由LIKE.TG编辑部转载自互联网并编辑,如有侵权影响,请联系官方客服,将为您妥善处理。
This article is republished from public internet and edited by the LIKE.TG editorial department. If there is any infringement, please contact our official customer service for proper handling.
效率工具客服坐席客服系统坐席多开