Operational Technology (OT) Security Users Have Shared Their Experience With Us

Updated December 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE Operational Technology (OT) Security report based on 230+ real user experiences with these popular products:

...and 15 more!

Where should we email your report?






CyberArk Privileged Access Manager review

SatishIyer
SatishIyer
Assistant Vice President at a financial services firm with 10,001+ employees
Lets you ensure relevant, compliant access in good time and with an audit trail,...
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a...
Claroty Platform review

AnandKumar2
AnandKumar2
Senior OT Security Consultant at a consultancy with 10,001+ employees
Useful for active coding, deep inspection of packages, and data retrieval
I appreciate the active coding, deep inspection of packages, and data retrieval. The tool covers information about assets and attack vectors, which I find superior to other tools. Based on alerts, I create reports detailing how an attacker can penetrate the plant, both externally and internally. Initially, I felt the Claroty Platform wasn't...

Since 2012, we've had 830,526 professionals use our research.

As seen in