Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the ...
During this webinar our experts reviewed how you can leverage passive automation to properly inventory OT assets, their workflows, communication paths, and protect them to an air-gapped level of security – without operation compromise ...