Traditional approaches for securing OT (operational technology) devices on OT and ICS networks have long been dependent on maintaining the separation of industrial applications from IT networks and remote-access users.
However, as OT organizations modernize their infrastructure with new technologies, such as Cloud SCADA, DCS and advanced Manufacturing Execution Systems (MES), traditional zoning strategies are no longer sufficient to keep OT environments safe.
Challenges in OT environments include: