Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Why OT Security Requires a Different Approach Than IT

Forescout
04/14/2026
2
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Critical infrastructure like utilities and hospitals runs on specialized OT equipment that cannot support traditional security tools like antivirus software.
  • Many OT devices have known vulnerabilities and fragile network stacks because they are rarely updated after deployment.
  • Forescout uses passive discovery combined with safe active probing to identify OT devices and map their communication patterns across the network.

Summary

This explainer video addresses the unique security challenges facing operational technology environments in critical infrastructure. Forescout highlights that essential services like power utilities, water treatment facilities, and healthcare systems rely on specialized equipment that cannot accommodate traditional security tools such as antivirus software. These devices—ranging from MRI machines to industrial sensors and actuators—often run on legacy systems with known vulnerabilities and fragile network stacks. The video explains Forescout's approach to OT security, which combines passive discovery to identify devices and their communication patterns with selective active probing for deeper inspection. This methodology enables organizations to understand their complete OT asset inventory, map device relationships across the Purdue model from level zero sensors through control workstations, and implement network segmentation to isolate vulnerable devices from unnecessary services. The core message emphasizes that visibility across the entire OT stack is the foundation for effective security in environments where traditional endpoint protection simply cannot be deployed.

Chapters

0:00 - The OT Security Challenge
0:25 - Vulnerabilities in Critical Infrastructure
0:49 - Forescout's Discovery Approach
1:10 - Full OT Stack Visibility

Key Quotes

0:00 "Did you know the electricity that powers your home, or the water company that brings you fresh water, or the hospital you go to for a checkup is run on equipment that you can't even install antivirus on? ..."
0:40 "The only way to secure them is to understand where they are and partition or segment them on your network so that it only talks to known, good, necessary services."
1:22 "See it, secure it, assure it."

Categories:
  • » Webinar Library » Forescout
  • » Cybersecurity » Network Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • OT
  • IoT Security
  • Network Security
  • Getting Started
  • OT security
  • critical infrastructure protection
  • network segmentation
  • asset discovery
  • industrial control systems
  • Purdue model
  • vulnerability management
  • passive network monitoring
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Why OT Security Requires a Different Approach Than IT

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/23/2026
                01:00 PM
                04/23/2026
                Cultivating Trust as a Foundation for the Agentic Consumer in 2026
                https://www.truthinit.com/index.php/channel/1883/cultivating-trust-as-a-foundation-for-the-agentic-consumer-in-2026/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                APAC: Harnessing AI to Identify Cyber Attacks Before They Evolve into Breaches
                https://www.truthinit.com/index.php/channel/1886/harnessing-ai-to-identify-cyber-attacks-before-they-evolve-into-breaches/
              • 05/12/2026
                11:30 PM
                05/12/2026
                APAC: Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      23

                      Cultivating Trust as a Foundation for the Agentic Consumer in 2026

                      04/23/202601:00 PM ET
                      • Apr
                        30

                        Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                        04/30/202610:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version