Find out what your peers are saying about Claroty, Nozomi, CyberArk and others in Operational Technology (OT) Security.
I would like more customizable options for configurations.
It's not cheap, yet it is also not super expensive either.
The product is stable and doesn’t usually require frequent technical support interaction.
The network visualization feature of Nozomi impacts security operations positively.
Dragos Platform is used for detecting and responding to threats in industrial control systems. Users value its effectiveness in identifying vulnerabilities and managing cybersecurity incidents, especially in industrial environments, thanks to its detailed network activity insights.
Dragos Platform is known for real-time threat detection, offering detailed insights and rapid response capabilities. Users appreciate its comprehensive asset identification and mapping, which enhances visibility across networks. Integration with existing security tools and compliance frameworks is seamless. The threat intelligence feed is constantly updated, providing timely alerts. Users highlight its deep analysis of industrial control systems and straightforward deployment. Asset identification and threat intelligence are key strengths.
What are the key features of Dragos Platform?Dragos Platform is often used in industries requiring precise control systems, such as energy, manufacturing, and critical infrastructure. These sectors benefit from its specialized focus on industrial environments, making it a valuable asset in detecting anomalies and facilitating incident response. Performance improvements, streamlined integration capabilities, and enhanced customer support are areas cited for enhancement, indicating a need for quicker resolution times and more efficient troubleshooting assistance.
Nozomi Networks enhances ICS and OT cybersecurity through threat detection, monitoring, and comprehensive asset management. Users value its real-time anomaly detection, advanced threat detection via machine learning, and intuitive interface, which streamline workflows and boost efficiency, ensuring compliance and robust network security.
We monitor all Operational Technology (OT) Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.