Articles

Considerations for purchasing IoT vulnerability management solutions

The category of IoT product security platforms is relatively new. The solutions are also referred to as: “firmware analysis”, “OT/IoT software supply chain security”, “automated security for embedded systems”, “networked device vulnerability assessment”, “reverse engineering/digital twin” or “automated security and compliance for digital products”. The solutions differ significantly in what they can ingest, analyze and …

Considerations for purchasing IoT vulnerability management solutions Read More »

Considerations for purchasing OT remote access solutions

Remote access solutions for OT environments are purchased either by plant operators, who usually use a variety of suppliers for control systems and machines in their plants, or by manufacturers of industrial automation technology and machine builders. Of course, there are conflicts of interest here: machine builders would prefer all their customers to use the …

Considerations for purchasing OT remote access solutions Read More »