Loading
Blog | Cybersecurity
Recent ActivityRecent Activity

Focus on Cybersecurity Threats that Really Matter

Push through the noise and turn your attention to the threats that matter.

Share This:

LinkedInLinkedIn
TwitterTwitter
FacebookFacebook
PrintPrint
EmailEmail
A woman explains cybersecurity details to an engineer within a manufacturing facility.
Blog | Cybersecurity
Recent ActivityRecent Activity
Focus on Cybersecurity Threats that Really Matter
Push through the noise and turn your attention to the threats that matter.

Share This:

LinkedInLinkedIn
TwitterTwitter
FacebookFacebook
PrintPrint
EmailEmail

Focus on the Cybersecurity Threats that Matter

With greater connectivity comes greater risk for security threats. These threats can take many forms, from bad actor hackers to well-intentioned mistakes. Cybersecurity events can impact network availability, interrupt operations and halt productivity.

Even with a robust security program in place, protecting your industrial networks against cyber threats requires constant vigilance. Threat detection services can help you monitor and detect these increasingly complex threats.

Threat detection software identifies events that do not conform to an expected pattern or baseline within Industrial Control System (ICS) networks – any activity that may pose a risk to the availability of your system even before it happens. It can also help in determining internal threats or inspecting traffic without disrupting normal production.

Threat Detection and Fine Tuning

A potential challenge of threat detection software is the proliferation of alarms: Too many system alarms are just as harmful as too few. Without the ability to fine-tune your threat detection, you can quickly become overwhelmed with noise – and potentially let bad actors infiltrate your system.

Threat tuning – also called system tuning – optimizes the configuration of the continuous threat detection (CTD) software to help eliminate false positives and prioritize actionable alerts. Threat tuning helps prevent alert fatigue – a dangerous condition that arises when thousands of alerts flood the screen with non-actionable items. The concept is not new – what is novel is how threat tuning is expanding beyond information technology (IT) systems for adoption in operations technology (OT) through a service that allows operators to fine-tune the system themselves.

Saving Time and Effort

Without threat tuning, a system could generate thousands of alerts per shift with fewer than .01% connected to an action, equating to hundreds of hours a year chasing down unnecessary alarms.

“With the right threat tuning software, you can eliminate the 99.9% of alerts that don’t matter so your operators can concentrate only on the messages of value,” said Quade Nettles, Cybersecurity Services Product Manager, Rockwell Automation.

Such clarity in threat detection and the improved response rate improves an organization’s security posture and positions the cybersecurity team for greater long-term continuous threat detect success.

Rockwell Automation and Claroty have partnered to offer comprehensive OT security solutions. The Rockwell Automation Twinsburg, Ohio, manufacturing facility was a proving ground for Claroty’s threat tuning capabilities.

The pilot included IT and OT functions that could experience more than 10,000 alarms daily.

“These results help to quantify the value of threat tuning in the overall CTD investment and specifically, protect ROI,” said Gary Kneeland, Technical Director, Claroty. “While it’s enticing to jump into real-time monitoring, it’s important to include managed services like threat tuning to experience the full range of benefits.”

With the convergence of IT and OT, it’s important to identify cybersecurity risks to industrial assets. And, it’s more important than ever to work with industrial security software providers like Claroty, and managed services providers like Rockwell Automation – companies that fully understand operational functions within industrial protocols and work to help secure and manage industrial control networks.

Published May 21, 2021

Rockwell Automation and Claroty: Comprehensive OT Cybersecurity
Two employees, a male and a female wearing yellow safety jackets and white hard hat looking at information on a monitor in a factory.
Overview
Rockwell Automation and Claroty: Comprehensive OT Cybersecurity

Rockwell Automation and Claroty have partnered to offer comprehensive OT security solutions tailored to meet your toughest challenges.

Watch Now
Tags: Cybersecurity

Carol Jors
Carol Jors
Storyteller, Rockwell Automation
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe
  • Sales
  • Customer Care
  • TechConnect Support
  • General Questions
  1. Chevron LeftChevron Left Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Company Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right