OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Data Sheet

Risk Scoring & Prioritization Data Sheet

To prioritize remediation of security efforts and reduce cost and complexity, organizations need ICS/OT risk assessments that include comprehensive risk scoring.

Read more
Data Sheet

Patch Management Data Sheet

Simplify and streamline OT / ICS patch management with Verve Security Center (VSC).

Read more
Data Sheet

Application Whitelisting Data Sheet

Secure application operations in OT/ICS with OEM-agnostic application whitelisting.

Read more
Data Sheet

Configuration Management Data Sheet

Verve’s secure configuration management assesses endpoints for potential insecure settings, enables hardening right from the console, and monitors for unintended changes to alert personnel to security or operational risks.

Read more
Data Sheet

Verve Security Center Data Sheet

The Verve Security Center enables the deepest asset inventory and integrated protection and response actions that reduce the time and cost of hardening systems and threat response.

Read more
Data Sheet

Vulnerability Management Data Sheet

Verve addresses OT vulnerability management challenges with software that gathers a full range of risk information and provides automated scoring and immediate remediation of risk from the same platform.

Read more
Blog November 5, 2020

5 Questions a CISO Should Ask About OT/ICS Cyber Security

These are 5 questions CISOs should ask as they pursue an OT or ICS cyber security program and establish an effective industrial organization and technical approach.

Read more
Blog October 30, 2020

5 Steps to Improve Cyber Security Awareness in Manufacturing and OT/ICS

Don’t wait to tackle cyber security until it’s too late. Here are five ways you can proactively prepare your organization with cyber security awareness.

Read more
Blog October 13, 2020

How to Close the OT Cyber Security Talent Gap

With a national skills shortage and gap of OT cyber security professionals, how do we leverage our current resources and develop the right jobs to improve the future?

Read more
Blog October 1, 2020

Embedded OT Vulnerabilities: An Asset Owner Perspective

What should asset owners be aware of with embedded OT systems and buried vulnerabilities, and what remediation tactics are available?

Read more