powered by Claroty
Find, manage, and analyze your OT inventory
The Asset Inventory Service improves the cybersecurity of your operational technology (OT) and cooperates with versiondog and all standard automation devices used by your OT ecosystem. The monitoring system contains OT asset identification in the form of an active scan, a network risk analysis as well as the ability to identify vulnerabilities and cyberattacks.
Automatic asset detection thanks to active scans as well as import of connected devices from versiondog
The devices connected in versiondog are automatically updated and added to the existing list along with all existing information. You can also detect any assets (using the active scan of your network) that are not backed up in versiondog at present and therefore not included in your disaster recovery plan. All identified assets will be automatically added to your central inventory list.
Here’s how you can easily eliminate gaps in your disaster recovery strategy.
Manage all of your critical infrastructure assets automatically in a central inventory list. Thanks to the additional detailed information from versiondog, you will receive a clear and straightforward allocation.
Receive all important information (e.g. firmware versions) concerning your critical assets at a glance.
Ensure your device data is up-to-date thanks to the latest common vulnerabilities and exposures (CVE) data and gain access to an extensive library of insecure protocols, misconfigurations and other vulnerable security points.
Gain an automatic assessment of all vulnerabilities, affected assets and the entire industrial network.
Gain overall device transparency as well as automatic device inventory with comprehensive information about hardware, firmware, model, rack slot, IP, manufacturer, etc.
Identify additional critical network assets not included in your disaster recovery plan and ensure future backups.
Centralized access, management, and reporting for all assets, including vulnerability and risk assessment.
Increase productivity, process streamlining and avoid human error. Thanks to reduced manual effort and simplified reporting you achieve more time to concentrate on more important matters.
At the heart of the Asset Inventory Service is the Asset list – this is where all assets in your OT ecosystem are brought together and managed centrally.
1. Automatic transfer of assets present in versiondog
Assets already available in versiondog are imported into the asset list. During this process, the project data available in versiondog is automatically read in and all asset data contained therein is added. Metadata from versiondog, such as a component path or the latest version, are also saved to facilitate asset assignment. Import is performed automatically after a relevant change (e.g., Check-In of a component or (optionally) after each job execution).
2. Perform an active scan of your network
Additional assets belonging to your OT ecosytsem, but which are not yet present in versiondog as components, can be identified and added via an active scan. Vulnerabilities and possible attacks are then determined from all identified assets and the associated information and data.
All identified network assets, which are not yet secured in versiondog, can be automatically imported into versiondog to extend your disaster recovery coverage.
The active scan is unique in that it uses both well-known IT-based queries and detection methods such as SNMP queries and proprietary queries. The unique OEM method of querying these assets is used to ensure the highest level of security. The Asset Inventory Service has broad protocol coverage and has developed specialized engines to query each OT asset according to its specific model and vendor.
The import process is performed automatically after a change in versiondog (e.g. Check-In of a component or (optionally) after each job execution). Since the import takes place on the versiondog server and after Check-In / job execution, the user’s workflow will not be disturbed.