{"id":91371,"date":"2024-10-07T11:57:58","date_gmt":"2024-10-07T03:57:58","guid":{"rendered":"https:\/\/version-2.com\/?p=91371"},"modified":"2024-11-20T17:10:53","modified_gmt":"2024-11-20T09:10:53","slug":"bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/10\/bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets\/","title":{"rendered":"Bridging IT and OT Security: NDR&#8217;s Role in the Protection of Industrial Assets"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"91371\" class=\"elementor elementor-91371\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca14f89 elementor-widget elementor-widget-text-editor\" data-id=\"ca14f89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field__item\"><p style=\"font-size: 23px;\">The convergence of Information Technology (IT) and Operational Technology (OT) is transforming industries. While this integration drives operational efficiency and faster decision-making, it also creates new cybersecurity challenges. GREYCORTEX Mendel offers a\u00a0unified way to monitor and protect both your IT and OT environments.<\/p><p>As digital transformation continues, IT systems, like corporate networks and databases, are increasingly linked with OT systems, such as industrial control systems and sensors. This connection improves data sharing and process control but demands a\u00a0unified approach to securing both technologies.<\/p><p>New cybersecurity threats are constantly emerging as the Internet of Things (IoT) and automation continue to grow. One of the biggest challenges is ensuring seamless communication between IT and OT teams, which often have distinct goals and methods. Addressing these challenges requires identifying critical assets and implementing tailored security measures.<\/p><h3>The Core Security Requirement<\/h3><p>A fundamental security requirement in any company is identifying and classifying assets. Understanding the value and strategic importance of each asset allows for the appropriate level of protection. Tools that enable effective monitoring and protection of both industrial and digital assets are essential in this context.<\/p><h3>Key Differences Between IT and OT Environments<\/h3><p>IT and OT environments differ in focus, asset life cycles, and the personnel managing them. While IT prioritizes data processing, business operations, and frequent updates, OT centers on controlling physical processes and maintaining long-term operational stability. OT systems often remain in place for decades without major updates, creating potential security gaps.<\/p><p>IT and OT teams also have different expertise. IT teams focus on data confidentiality and cybersecurity, while OT teams prioritize the safe operation of industrial assets, often resisting upgrades to avoid disruptions.\u00a0<\/p><p>Another key difference lies in the communication protocols used in each environment.<\/p><p>So how do you protect both environments with one monitoring solution?<\/p><h3>NDR\u2019s Role in Protecting IT and\u00a0OT<\/h3><p>NDR solutions are pivotal in safeguarding industrial environments, providing visibility into both your IT and OT networks. A\u00a0prime example is GREYCORTEX Mendel, which passively monitors traffic across both networks to detect anomalies without interfering with system operations\u2014a critical requirement for industrial settings.<\/p><p>Mendel correlates data from various sources to identify threats early, allowing analysts to investigate security events and uncover connections between them. While defining processes and security policies is critical, verifying compliance is equally important. Mendel continuously monitors these processes and notifies you about any non-compliance. Any incidents detected can also be easily exported into clear reports.<\/p><h3>Bridging the IT-OT Divide<\/h3><p>Better infrastructure visibility, deeper threat understanding, stronger protection of both digital and industrial assets\u2014these are some of the key benefits that NDR solutions bring.<\/p><p>Mendel facilitates cooperation between your IT and OT teams. By integrating with the MITRE ATT<span class=\"amp\">&amp;<\/span>CK\u00ae Framework, Mendel creates a\u00a0common language for analyzing threats, helping both teams collaborate more effectively.<\/p><p>Additionally, Mendel allows you to customize event categorization based on team needs, ensuring IT and OT professionals see the information that matters most to them\u2014within the same solution, but with their own tailored interface.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.png?itok=vSf82Pi4\" data-lg-id=\"6c717b66-b923-4c54-bace-591a82920a5e\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.png?itok=vSf82Pi4\" type=\"image\/png\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.webp?itok=vSf82Pi4\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h2>The Future of Industrial Cybersecurity<\/h2><p>As cyber threats evolve, the convergence of IT and OT systems requires tools that can adapt and offer comprehensive protection. GREYCORTEX Mendel meets these needs by learning and responding to new attack types, ensuring the security of both your digital and industrial assets. The continued integration of IT and OT networks necessitates a\u00a0unified monitoring and response approach, where NDR solutions are central. By leveraging tools like Mendel, organizations can strengthen their cybersecurity posture, ensuring resilience and continuity in an increasingly interconnected digital landscape.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18179\" class=\"elementor elementor-18179\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About GREYCORTEX<br \/><\/strong>GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.<\/p>\n<p>MENDEL, GREYCORTEX\u2019s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.<\/p>\n<p>MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The convergence of Information Technology (IT) and Oper [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,24,61],"tags":[23,435,1272],"class_list":["post-91371","post","type-post","status-publish","format-standard","hentry","category-1273","category-greycortex","category-press-release","tag-greycortex","tag-mendel","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bridging IT and OT Security: NDR&#039;s Role in the Protection of Industrial Assets - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bridging IT and OT Security: NDR&#039;s Role in the Protection of Industrial Assets - Version 2\" \/>\n<meta property=\"og:description\" content=\"The convergence of Information Technology (IT) and Oper [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T03:57:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T09:10:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.webp?itok=vSf82Pi4\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Bridging IT and OT Security: NDR&#8217;s Role in the Protection of Industrial Assets\",\"datePublished\":\"2024-10-07T03:57:58+00:00\",\"dateModified\":\"2024-11-20T09:10:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets\\\/\"},\"wordCount\":609,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/it-ot-profiles-002.webp?itok=vSf82Pi4\",\"keywords\":[\"Greycortex\",\"MENDEL\",\"2024\"],\"articleSection\":[\"2024\",\"Greycortex\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets\\\/\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets\",\"name\":\"Bridging IT and OT Security: NDR's Role in the Protection of Industrial Assets - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/it-ot-profiles-002.webp?itok=vSf82Pi4\",\"datePublished\":\"2024-10-07T03:57:58+00:00\",\"dateModified\":\"2024-11-20T09:10:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/it-ot-profiles-002.webp?itok=vSf82Pi4\",\"contentUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/it-ot-profiles-002.webp?itok=vSf82Pi4\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bridging IT and OT Security: NDR&#8217;s Role in the Protection of Industrial Assets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bridging IT and OT Security: NDR's Role in the Protection of Industrial Assets - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets","og_locale":"en_US","og_type":"article","og_title":"Bridging IT and OT Security: NDR's Role in the Protection of Industrial Assets - Version 2","og_description":"The convergence of Information Technology (IT) and Oper [&hellip;]","og_url":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets","og_site_name":"Version 2","article_published_time":"2024-10-07T03:57:58+00:00","article_modified_time":"2024-11-20T09:10:53+00:00","og_image":[{"url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.webp?itok=vSf82Pi4","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Bridging IT and OT Security: NDR&#8217;s Role in the Protection of Industrial Assets","datePublished":"2024-10-07T03:57:58+00:00","dateModified":"2024-11-20T09:10:53+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets\/"},"wordCount":609,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.webp?itok=vSf82Pi4","keywords":["Greycortex","MENDEL","2024"],"articleSection":["2024","Greycortex","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/bridging-it-and-ot-security-ndrs-role-in-the-protection-of-industrial-assets\/","url":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets","name":"Bridging IT and OT Security: NDR's Role in the Protection of Industrial Assets - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.webp?itok=vSf82Pi4","datePublished":"2024-10-07T03:57:58+00:00","dateModified":"2024-11-20T09:10:53+00:00","breadcrumb":{"@id":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#primaryimage","url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.webp?itok=vSf82Pi4","contentUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/it-ot-profiles-002.webp?itok=vSf82Pi4"},{"@type":"BreadcrumbList","@id":"https:\/\/www.greycortex.com\/blog\/bridging-it-and-ot-security-ndrs-role-protection-industrial-assets#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Bridging IT and OT Security: NDR&#8217;s Role in the Protection of Industrial Assets"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-nLJ","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/91371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=91371"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/91371\/revisions"}],"predecessor-version":[{"id":97933,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/91371\/revisions\/97933"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=91371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=91371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=91371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}