Through proactive vulnerability, change and risk detection, octoplant, as part of the complete security architecture, protects production processes from attacks and prevents damage and production downtime. With the help of octoplant, damage can be prevented, or the impact reduced.
Today, no company can rule out the possibility of being targeted by cyber attacks, which increasingly affect operational technology (OT) in industrial plants. Proactive protection measures are essential to reduce downtime, errors, and safety hazards. As part of risk analyses of the entire plant, weak points can be identified and eliminated based on the device inventory.
6 out of 10 customers stated in the 2021 annual customer survey that the safety they achieve with versiondog (predecessor product of octoplant) is one of the strongest advantages for them.*
*Source: AUVESY GmbH customer survey, survey period 2021, 189 respondents.
Understand the performance and security level of your assets and receive tangible recommendations.
Receive a complete vulnerability exposure overview of your assets, incl. mitigation recommendation.
Cyberattacks are a real danger for us. When it comes to safeguarding against attacks from outside, it is more advantageous to have a larger shield than a smaller one! The ability to trace all incidences of data access, including the timestamp, was what led to the decision to integrate versiondog*.
With octoplant's threat protection features, you can get an overview of vulnerabilities in the entire plant as well as individual machines and devices. See which devices are considered risky and reduce risks and hidden vulnerabilities.
The devices connected in octoplant are automatically updated and added to the asset list with all existing information. This makes it easy to eliminate gaps in your disaster recovery strategy. Metadata from octoplant, such as the component path or the latest version, is also stored to facilitate asset mapping.
Critical devices are stored in a central inventory list and octoplant enables you to clearly evaluate firmware versions and drivers - all at a glance (single source of truth strategy).
octoplant provides an up-to-date comparison of device details with the latest CVE (Common Vulnerabilities and Exposures) data. This gives you access to an extensive library of unsecure protocols, misconfigurations, and other security vulnerabilities - and finds all vulnerabilities in individual devices and in the network.
More information about the CVSS score can be found under the following public link: