Sponsored content
In this whitepaper from Leonton, readers will find out more about the defense-in-depth strategy, alongside much more, including:

  • An overview of improving OT security processes and devices
  • Segmenting OT networks – the process of splitting a physical network into several smaller isolated networks
  • Securing the Edge of OT networks
  • Filtering network traffic via ACL (Access Control List)
As the full potential of the Internet of Things (IoT) for the industrial edge and the trend towards data-driven decision making continues to be unleashed, the IT/OT (Operational Technology) convergence helps businesses streamline their existing operational processes.

This convergence process, however, increases the risk of being exposed, since traditional physical security networks and devices – which typically operated on a standalone basis – are now connected to the internet and organisation’s IT network, making the data vulnerable to cyber attacks.

In order to defend against such cyber attacks, a multi-layered security strategic approach called ‘defence-in-depth’ is recommended to protect critical OT/physical security assets. By implementing defense-in-depth, this should help reduce the likelihood of a security breach.
Sponsored by