As manufacturers modernize operating technology, closing security holes is a growing priority


STAMFORD, Connecticut – (COMMERCIAL THREAD(ISG) (Nasdaq: III), one of the world’s leading technology research and consulting firms.

The 2021 ISG Provider Lens ™ Manufacturing Industry Services – Global report reveals that the complex mix of legacy OTs and newer connected technologies such as industrial IoT and machine learning has forced manufacturers to add security extensions to protect against cyber attacks.

“Manufacturers face a growing need for security tools to ensure seamless operations and defend against attacks that can lead to downtime, financial loss and damage to reputation,” said Christian Decker, Partner , ISG Smart Manufacturing. “More and more heavy industry companies are starting to recognize these threats and allow funding for OT security across their facilities. ”

Utilities, healthcare companies and some manufacturing companies have been the most aggressive in adopting defenses against cybersecurity threats, according to the report. A growing number of advanced tools for launching cyber-physical attacks against industrial infrastructure are available for free online. However, the automobile and some other heavy industries have yet to implement OT security and have therefore fallen victim to cyber attacks, such as recent action against a Japanese automaker that resulted in several factories going offline.

Proactive companies look for OT security solutions that can be extended and applied to on-premise assets, including specialized infrastructure such as fuel sensor networks at oil refineries. They are also looking for solutions that can manage and secure all types of devices through an open platform, says ISG. These include both threat detection and derailment and decoy and deception functions to prevent intrusions in the first place. New deception technologies can first disrupt attackers’ attempts to probe the network and then provide them with false information.

According to ISG, many organizations are moving beyond point solutions and moving to OT security systems that provide unified visibility across all assets. This is quickly becoming imperative for organizations that have started to introduce digitization, AI, and cloud-based infrastructure. The most effective unified security systems encompass all OT and IT elements, including IoT, industrial IoT, mobile and wireless devices.

The next phase of OT security will be adopting stable cloud infrastructures to store the large data of a manufacturer and its customers, ISG predicts. By combining them into a data lake, companies will be able to apply machine learning algorithms to gain additional insights and recommendations.

Mobility industries, especially the automobile, also face security threats from vehicles, according to the report. For example, experiments have shown that manipulating the geolocation systems of connected cars can allow attackers to take control of direction and speed. OEMs and suppliers are integrating products from emerging automotive security vendors to defend against potential attacks and comply with increasingly stringent regulations.

The 2021 ISG Provider Lens ™ Manufacturing Industry Services – Global report assesses the capabilities of 36 suppliers in two quadrants: OT Security Solutions and Mobility Security Solutions.

The report names Argus Cyber ​​Security, Arilou, Armis, Attivo Networks, Claroty, CYMOTIVE, Guardknox, Karamba Security, Nozomi Networks, Radiflow, Regulus Cyber, SCADAfence, Tenable and Upstream Security as leaders in one quadrant each.

Additionally, Dellfer and SIGA OT are named Rising Stars – companies with a “promising portfolio” and “high future potential” as defined by ISG – in one quadrant each.

A customized version of the report is available from SCADAfence.

The 2021 ISG Provider Lens ™ Manufacturing Industry Services – Global report is available for subscribers or for a one-time purchase on this webpage.

About ISG Provider Lens ™ Research

The ISG Provider Lens ™ Quadrant research series is the only service provider assessment of its kind to combine empirical and data-driven research and market analysis with the real-world experience and observations of the advisory team. world of ISG. Companies will find a wealth of in-depth data and market analysis to help them select suitable sourcing partners, while ISG advisors will use the reports to validate their own market knowledge and make recommendations to corporate clients. ISG. Research currently covers providers offering their services worldwide, across Europe, as well as USA, Canada, Brazil, UK, France, Benelux, Germany, Switzerland , in the Nordic countries, Australia and Singapore / Malaysia, with additional markets to be added. in the future. For more information on ISG Provider Lens research, please visit this webpage.

A supporting body of research, the ISG Provider Lens Archetype reports, offers a groundbreaking assessment of suppliers from the perspective of specific types of buyers.

About ISG

ISG (Information Services Group) (Nasdaq: III) is a leading global technology research and consulting company. A trusted business partner to more than 700 customers, including more than 75 of the world’s 100 largest companies, ISG is committed to helping businesses, public sector organizations, and service and technology providers achieve operational excellence and faster growth. The company specializes in digital transformation services including automation, cloud and data analytics; procurement advice; managed governance and risk management services; network operator services; design of strategy and operations; change management; market intelligence and technology research and analysis. Founded in 2006, and headquartered in Stamford, Connecticut, ISG employs more than 1,300 digitally ready professionals operating in more than 20 countries — a global team known for their innovative thinking, market influence, deep industrial and technological expertise. and its world-class expertise. Industry’s most comprehensive market data-driven research and analysis capabilities. For more information, visit


Comments are closed.