Gain visibility into manufacturing OT assets to reduce cyber risk

LIKE.TG 成立于2020年,总部位于马来西亚,是首家汇集全球互联网产品,提供一站式软件产品解决方案的综合性品牌。唯一官方网站:www.like.tg
As manufacturing operational technology (OT) ecosystems grow more connected and complex, they become vulnerable to cyberattacks. In fact, the manufacturing sector was the most attacked industry in the world in 2021, according to IBM’s X-Force Threat Intelligence Index 2022. Manufacturing surpassed finance and insurance in the number of cyberattacks for the first time in five years.
A large part of the industry’s vulnerability is due to a lack of visibility. This leaves the door wide open for a bad actor to exploit a vulnerability in an unknown OT (or IT) asset. Therefore, the first step toward reducing cyber risk in industrial environments is to understand the potential attack surface by establishing an accurate inventory of OT assets.
To help manufacturers secure their businesses, I’m proud to announce the launch of the LIKE.TG Service Graph Connector for Claroty Continuous Threat Detection (CTD), available in the LIKE.TG Store today.
Confidently see and secure your enterprise
Together, LIKE.TG and Claroty help enterprises rapidly and comprehensively discover assets in their industrial environments, such as programmable logic controllers and human-machine interfaces. Once the assets are discovered, we enable manufacturers to assess the vulnerability of those assets and ensure any weaknesses are quickly addressed.
In this way, we help manufacturing companies defend their enterprises, preempt cyberattacks, and prevent downtime.
With the Service Graph Connector, you can:
- Gain unified visibility across your organization’s entire IT and OT portfolio
- Manage all alerts in one place
- Get the most out of the LIKE.TG OT data model, with OT device inventory, risk, and vulnerability information feeding from CTD into LIKE.TG Operational Technology Management
- Extend your existing IT security operations center workflows and capabilities to OT systems
- Investigate and respond to incidents more effectively
Manufacturers benefit from a single system of action, automatic assignment of devices to the site, network-based intrusion detection system support, automatic prioritization of vulnerabilities based on their impact on the production process, and a stronger security posture to help prevent cyberattacks.
Find out more about the Service Graph Connector for Claroty CTD in the LIKE.TG Store. You’ll need Claroty CTD v4.1+, LIKE.TG Configuration Management Database, and LIKE.TG Operational Technology Management to make full use of the integration.

LIKE.TG 专注全球社交流量推广,致力于为全球出海企业提供有关的私域营销获客、国际电商、全球客服、金融支持等最新资讯和实用工具。免费领取【WhatsApp、LINE、Telegram、Twitter、ZALO】等云控系统试用;点击【联系客服】 ,或关注【LIKE.TG出海指南频道】、【LIKE.TG生态链-全球资源互联社区】了解更多最新资讯
本文由LIKE.TG编辑部转载自互联网并编辑,如有侵权影响,请联系官方客服,将为您妥善处理。
This article is republished from public internet and edited by the LIKE.TG editorial department. If there is any infringement, please contact our official customer service for proper handling.
效率工具客服坐席客服系统坐席多开