Lack of Device Identity
Many OT devices were designed before cybersecurity was a priority, so they lack unique identities that can be authenticated. These legacy systems, insecure by design and highly sensitive to network and firmware changes, were not built to withstand today’s sophisticated cyber threats.
Hard to Scale
Managing security policies and identities for thousands of devices can be overwhelming. Manufacturers often struggle with blind spots around IoT and OT devices, along with limited access to real-time operational data, which can undermine resilience.
Evaluating Device Risks is Hard
Accurately determining threat scores for a vast number of devices, especially in real-time, is complex. This complexity arises due to the need for multi-layered threat assessment approaches that incorporate both static and dynamic analysis.
Interoperability Challenges
Ensuring that new security solutions integrate seamlessly with existing OT and IoT systems without causing disruptions is a significant challenge. Many legacy systems use proprietary protocols and standards, making integration with modern security tools difficult.
Regulatory Compliance
Compliance with industry-specific regulations and standards is crucial but challenging. Regulations such as NERC CIP for energy and ISO/IEC 27001 for information security impose strict requirements that can be difficult to meet with existing infrastructure.