Skip to main content

Threat Protection: Proactively detect and eliminate vulnerabilities

 

 

octoplant Threat Protection

Systematically implement cyber security and proactively prevent or mitigate damage

Through proactive vulnerability, change and risk detection, octoplant, as part of the complete security architecture, protects production processes from attacks and prevents damage and production downtime. With the help of octoplant, damage can be prevented, or the impact reduced.

Today, no company can rule out the possibility of being targeted by cyber attacks, which increasingly affect operational technology (OT) in industrial plants. Proactive protection measures are essential to reduce downtime, errors, and safety hazards. As part of risk analyses of the entire plant, weak points can be identified and eliminated based on the device inventory.

Icon für Kundenbefragung
CUSTOMER SURVEY
Safety

6 out of 10 customers stated in the 2021 annual customer survey that the safety they achieve with versiondog (predecessor product of octoplant) is one of the strongest advantages for them.*

*Source: AUVESY GmbH customer survey, survey period 2021, 189 respondents.

Features of octoplant Threat Protection

Conduct performance and security check

Understand the performance and security level of your assets and receive tangible recommendations.

Create vulnerability report

Receive a complete vulnerability exposure overview of your assets, incl. mitigation recommendation.

octoplant Broschüre englisch Screenshot

octoplant product brochure

Achieve complete control over your production
environment and industrial automation.
Greater data consistency, security, safety, and reliability
with backups and version control.

Download now

What our customers say

Portrait Matthias Teitge von Wolters

Cyberattacks are a real danger for us. When it comes to safeguarding against attacks from outside, it is more advantageous to have a larger shield than a smaller one! The ability to trace all incidences of data access, including the timestamp, was what led to the decision to integrate versiondog*.

Matthias Teitge, Head of Plant Management at Hofbrauhaus Wolters brewery
*) versiondog was the former software solution of AUVESY

Identify and proactively close security gaps and risks

With octoplant's threat protection features, you can get an overview of vulnerabilities in the entire plant as well as individual machines and devices. See which devices are considered risky and reduce risks and hidden vulnerabilities. 

FAQ

Get answers to the most frequently asked questions about Threat Protection.

What information does the device inventory contain?
  • hardware
  • firmware
  • model
  • rack slot
  • IP
  • manufacturer
  • and more
What does the asset risk score or CVSS (Common Vulnerability Scoring System) refer to?

More information about the CVSS score can be found under the following public link:

https://de.wikipedia.org/wiki/CVSS

Case studies