{"id":58623,"date":"2022-09-21T16:15:48","date_gmt":"2022-09-21T08:15:48","guid":{"rendered":"https:\/\/version-2.com\/?p=58623"},"modified":"2022-12-02T18:13:45","modified_gmt":"2022-12-02T10:13:45","slug":"enhancing-ot-security-without-disrupting-operations","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/09\/enhancing-ot-security-without-disrupting-operations\/","title":{"rendered":"Enhancing OT Security Without Disrupting Operations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"58623\" class=\"elementor elementor-58623\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/09\/operational-technology-tile.png\" width=\"800\" height=\"500\" \/><\/p><h3>What is Operational Technology?<\/h3><p><span data-contrast=\"auto\">Cybersecurity has come a long way in the recent past. Its importance is felt in all aspects of modern life, both personal and industrial. The current digital and network advancements are steadily pushing Information Technology (IT) and <\/span><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/operational-technology-ot\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Operational Technology<\/span><\/a><span data-contrast=\"auto\"> (OT) towards integration. While IT systems interact with each other for data-centric computing, OT systems involve hardware and software that monitors or controls physical devices and processes to detect or cause changes in an industrial environment or enterprise.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">OT plays a significant role in Industrial Control Systems (<\/span><a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/industrial_control_system\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">ICS<\/span><\/a><span data-contrast=\"auto\">) and encompasses a wide variety of programmable systems such as Supervisory Control and Data Acquisition systems (<\/span><a href=\"https:\/\/inductiveautomation.com\/resources\/article\/what-is-scada\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">SCADA<\/span><\/a><span data-contrast=\"auto\">) and Distributed Control Systems (DCS). These are found in many aspects of the environments we interact with daily, which makes keeping these systems secure a top priority. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Industrial systems traditionally have relied on human monitoring and management through proprietary control protocols and software. Today, however, more industrial systems are automating these processes in a bid to boost efficiency and deliver better and smarter analytics through the convergence of OT and IT systems. This fills in the \u00a0gap that previously that isolated OT from IT. This bridge ensures that the information passed down to the people, sensors, devices, and machines is accurate and on time. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><h3>How IoT Adoption Affects OT Systems<\/h3><p><span data-contrast=\"auto\">Anyone who has been around long enough to see how the internet and modern technology have changed the world can attest to its benefits. The shift to making most aspects of human life \u2018smart\u2019 has had both positive and negative effects. In a bid to make OT systems more efficient and reliable, most people have adopted integrated enterprise software and analytic data services. This makes processes and systems such as cooling efficient and also monitoring devices easy and more cost-effective.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">This action comes with one main downside; an increase in security risks. The connection of these systems leaves industrial networks and components vulnerable to OT security deficiencies such as lack of encryption, buffer overflow, backdoors and other tailored attacks on physical components.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The digital attack surface also grows massively. For instance, in a configuration where things go through a switch, it would be difficult to monitor the traffic or detect changes. This makes the network vulnerable to targeted attacks. Some economies or communities could face utter devastation should their industrial systems be attacked due to the high cost of some of the industrial equipment.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">On the brighter side, industrial networks can be protected without risking non-compliance or <\/span><span data-contrast=\"none\">disruption of operations<\/span><span data-contrast=\"auto\">. While IT security deals with data flow and its protection, <\/span><span data-contrast=\"none\">OT security<\/span><span data-contrast=\"auto\"> is focused on the safety and efficiency of industrial operations. By implementing proper security strategies and policies that ensure the visibility of all network control traffic, you can effectively reduce security risks and protect operations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><h3>Modern OT Security Approaches<\/h3><p><span data-contrast=\"auto\">The integration of OT and IT systems has led to the development of OT security. This is done in a bid to protect lives and assets and ensure that there is no operating downtime leading to production losses. The common standards and practices for secure OT systems are detailed by bodies such as The <\/span><a href=\"https:\/\/csrc.nist.gov\/News\/2022\/guide-to-operational-technology-ot-security\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">National Institute of Standards and Technology<\/span><\/a><span data-contrast=\"auto\"> and the <\/span><a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/operational-technologies\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">UK\u2019s National Cyber Security Center<\/span><\/a><span data-contrast=\"auto\">. Their reports have detailed information on OT risk management, vulnerabilities, recommended practices and guidelines. These form the framework for different ways to secure OT systems.<\/span><\/p><p><span data-contrast=\"auto\">When protecting OT systems, one must first understand the vulnerabilities that they face. Now that OT, IT, and IoT systems have become part of an indistinguishable system, any margins of error could mean a collapse in the whole network. Some of the ways OT networks are compromised by malignant elements include:\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><ul><li style=\"font-weight: 400;\" data-leveltext=\"\" data-font=\"Barlow\" data-listid=\"0\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Unauthorized Changes<\/span><\/b><span data-contrast=\"auto\">: This could consist of disabling safety sensors and alarms. This also increases the risk of bad actors inputting instructions that could lead to downtime.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><\/ul><ul><li style=\"font-weight: 400;\" data-leveltext=\"\" data-font=\"Barlow\" data-listid=\"0\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Interference With Critical Infrastructure<\/span><\/b><span data-contrast=\"auto\">: Access to sites and operational systems should only be granted to authorized personnel. Interference of control units and equipment protection systems could lead to irreparable damage,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><\/ul><ul><li style=\"font-weight: 400;\" data-leveltext=\"\" data-font=\"Barlow,Times New Roman\" data-listid=\"0\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Manipulation or Modification of Sent Information<\/span><\/b><span data-contrast=\"auto\">: Hackers use this technique to disguise unauthorized changes and breaches as they penetrate the system.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">It is always essential to understand that attacks could come from within. It could be rogue employees with infected USBs or even poor coding. This means that industrial security has to be both preventive and offensive. Apart from the conventional security protocols, OT protection must be based on a fully visible IT\/OT infrastructure. This means employing monitoring and analysis tools that can detect even the most minute anomalies.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><h3><strong>Best Practices for OT Security<\/strong><\/h3><p><span data-contrast=\"auto\">An efficient OT security plan should incorporate three main levels of protection and include the following practices:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><h5>Using Next-Generation Firewalls (NGFW) in OT Networks<\/h5><p><span data-contrast=\"auto\">Traditional firewalls had their drawbacks in terms of network speed, awareness limitations and their inability to adapt to new threats. Next-Generation Firewalls (<\/span><a href=\"https:\/\/www.portnox.com\/blog\/the-firewall-is-here-to-stay\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">NGFWs<\/span><\/a><span data-contrast=\"auto\">), on the other hand, offer the best security against threats by giving you complete control of the industrial systems. These firewalls are made to meet any configuration in the ICS for maximum visibility and monitoring. Organized architecture in terms of control ensures efficient and uninterrupted workflow. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><h5>Having Efficient System Restore Plans<\/h5><p><span data-contrast=\"auto\">Should there be any breaches or failures of certain components within the OT network, there should be protocols to restore functionality without delaying operations. The SRP should take the least amount of time. Moreover, despite the conditions or challenges faced, the industrial environment should be designed in a way that ensures operations can continue running, awaiting restoration. This means enabling the workforce access to manual control and emergency operations.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><h5>Risk-Based Vulnerability Management<\/h5><p><span data-contrast=\"auto\">The <\/span><a href=\"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">RBVM<\/span><\/a><span data-contrast=\"auto\"> system provides comprehensive information on possible threats and the extent of their effects. In collaboration with network analytics such as mapping constant monitoring, it is possible to anticipate the risks that the threats pose and prepare the security team with efficient responses or possible SRP.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">These layers of protection also need to be coupled with other general security practices. For instance, access to OT network devices and systems should be restricted to unauthorized parties. This can be achieved by separating the cooperate network from the OT network. On the other hand, remote access solutions should be available.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><a href=\"https:\/\/www.portnox.com\/blog\/how-organizations-can-secure-network-access-for-remote-workforces\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Remote access<\/span><\/a><span data-contrast=\"auto\"> is a contentious security measure. One of the channels used by bad actors is the backdoors that remote access leaves. To counter this vulnerability, remote access sessions can be restricted and monitored by time and user activity. When it comes to safeguarding data, the best solution is encryption. Backups and restore points also need to be in place. Using these tools and security protocols means that the OT network remains secure while the industrial environment remains fully operational.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><h3>What the Future Holds for OT Security<\/h3><p><span data-contrast=\"auto\">The best part of technology is its nature and tendency to evolve. This means that cybersecurity will only get better. At the moment, OT security faces a couple of minor setbacks primarily due to its nature. A fact that is evident in the design of these systems. Since they are meant to run for years, the focus is placed more on their reliability rather than security. As more OT systems are connected to a network, their lack of initial security and use of legacy protocols poses significant risks.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">As mentioned, however, the beauty of technology is adaptation. To maneuver these challenges, businesses are adding newer devices to their OT enterprises and taking OT cybersecurity seriously. It is clear that the future of OT security is bright due to the growing investment in OT security. Professionals in this sector are increasing in number every day after its necessity was realized.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Cloud technology has also improved the industrial environment by connecting workplaces. This game-changer is poised to boost production and ensure efficiency while still maintaining low production costs.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Controversial as it may sound, even hacking and other unauthorized breaches help increase OT security. This inverse effect is due to the fact that by revealing the gaps and vulnerabilities in the system, light is shed on the areas that require patching or even upgrading.<\/span><\/p><h3><strong>Final Thoughts on OT Security<\/strong><\/h3><p><span data-contrast=\"auto\"> In conclusion, every party involved in this industry must acknowledge the need for upgraded and efficient OT security solutions. There is a need to pool resources and specialize in OT Cybersecurity if its development is to be sustainable and future-proof. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Operational Technology? Cybersecurity has come  [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,424,61],"tags":[489,352,423],"class_list":["post-58623","post","type-post","status-publish","format-standard","hentry","category-488","category-portnox","category-press-release","tag-489","tag-network","tag-portnox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enhancing OT Security Without Disrupting Operations - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing OT Security Without Disrupting Operations - Version 2\" \/>\n<meta property=\"og:description\" content=\"What is Operational Technology? Cybersecurity has come [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-21T08:15:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-02T10:13:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/09\/operational-technology-tile.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/enhancing-ot-security-without-disrupting-operations\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Enhancing OT Security Without Disrupting Operations\",\"datePublished\":\"2022-09-21T08:15:48+00:00\",\"dateModified\":\"2022-12-02T10:13:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/enhancing-ot-security-without-disrupting-operations\\\/\"},\"wordCount\":1396,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/operational-technology-tile.png\",\"keywords\":[\"2022\",\"Network\",\"Portnox\"],\"articleSection\":[\"2022\",\"Portnox\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/enhancing-ot-security-without-disrupting-operations\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/\",\"name\":\"Enhancing OT Security Without Disrupting Operations - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/operational-technology-tile.png\",\"datePublished\":\"2022-09-21T08:15:48+00:00\",\"dateModified\":\"2022-12-02T10:13:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/operational-technology-tile.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/operational-technology-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/enhancing-ot-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing OT Security Without Disrupting Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhancing OT Security Without Disrupting Operations - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/","og_locale":"zh_HK","og_type":"article","og_title":"Enhancing OT Security Without Disrupting Operations - Version 2","og_description":"What is Operational Technology? Cybersecurity has come [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/","og_site_name":"Version 2","article_published_time":"2022-09-21T08:15:48+00:00","article_modified_time":"2022-12-02T10:13:45+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/09\/operational-technology-tile.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/09\/enhancing-ot-security-without-disrupting-operations\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Enhancing OT Security Without Disrupting Operations","datePublished":"2022-09-21T08:15:48+00:00","dateModified":"2022-12-02T10:13:45+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/09\/enhancing-ot-security-without-disrupting-operations\/"},"wordCount":1396,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/09\/operational-technology-tile.png","keywords":["2022","Network","Portnox"],"articleSection":["2022","Portnox","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/09\/enhancing-ot-security-without-disrupting-operations\/","url":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/","name":"Enhancing OT Security Without Disrupting Operations - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/09\/operational-technology-tile.png","datePublished":"2022-09-21T08:15:48+00:00","dateModified":"2022-12-02T10:13:45+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/09\/operational-technology-tile.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/09\/operational-technology-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/enhancing-ot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Enhancing OT Security Without Disrupting Operations"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ffx","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/58623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=58623"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/58623\/revisions"}],"predecessor-version":[{"id":58627,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/58623\/revisions\/58627"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=58623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=58623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=58623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}