BigFix Software Integration
How BigFix software helps manage IT/OT convergence by safely applying proven technology safely into OT environments.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Industrial companies of all types want to find efficiencies and greater security from managing IT and OT assets in a cohesive manner. Each organization has its own approach to IT/OT/IOT integration, but all have a desire to drive greater efficiencies in tools and processes.
A very large electric power company with generation and transmission assets covering over 140,000 square miles with 12 thermal generation and another 35 renewable sites needed an end point management solution that could extend safely to cover their OT & IOT systems in their production environments. The critical customer needs included:
The customer needed to achieve comprehensive cyber security compliance across all of their end points. It was not enough just to cover IT devices outside the ICS firewalls. They needed end point management on Windows/Unix/Linux devices inside the firewalls – at level 2. In addition, they needed to manage compliance of embedded devices – from a range of OEM switches and routers to controllers, PLCs, protective relays, security cameras and swipe cards, etc. – at level 1. Furthermore, they had dozens of sites which needed a local security solution, but the ability for a central team to analyze site-specific information.
The Verve Security Center (VSC) was the answer. Extending industry-leading BigFix, VSC enables OT leadership to use the same tools as their IT counterparts. Moreover, in that same platform, they can also manage all of the complex, proprietary devices that exist in an OT environment using Verve’s agentless device interface (ADI). And VSC’s unique hybrid architecture enables multi-site reporting, with localized actions for patching, configuration, and other protective management.
How BigFix software helps manage IT/OT convergence by safely applying proven technology safely into OT environments.
Learn MoreIT endpoint management tools used in ICS security bridge the gap between IT and OT cyber security in a safe, automated way to address skill shortages and OT safety-first principles.
Learn MoreReducing OT cyber security attack surface by disabling USB ports as a best practice system hardening task
Learn More