Anzeige
Mehr »
Sonntag, 06.07.2025 - Börsentäglich über 12.000 News
LiquidLink startet Bitcoin Lightning- und XRP-ILP-Nodes - Aufbau des Rückgrats der tokenisierten Finanzwelt
Anzeige

Indizes

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Aktien

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Xetra-Orderbuch

Fonds

Kurs

%

Devisen

Kurs

%

Rohstoffe

Kurs

%

Themen

Kurs

%

Erweiterte Suche
GlobeNewswire (Europe)
546 Leser
Artikel bewerten:
(2)

Fortinet, Inc.: Fortinet Global Survey Uncovers Critical OT Security Challenges

93% of OT Organizations Experienced an Intrusion in Past 12 Months, and 78% Experienced More than Three

SUNNYVALE, Calif., June 15, 2022 (GLOBE NEWSWIRE) --

John Maddison, EVP of Products and CMO at Fortinet
"This year's global State of OT and Cybersecurity Report demonstrates that while OT security has the attention of organizational leaders, critical security gaps remain. PLCs designed without security, continued intrusions, a lack of centralized visibility across OT activities, and growing connectivity to OT are some of the critical challenges these organizations need to address. Security converged into the OT networking infrastructure, including switches and access points and firewalls, is essential to segment the environment. This combined with a platform that spans OT, converged OT/IT and IT provides end-to-end visibility and control."

News Summary
Fortinet. While industrial control environments continue to be a target for cyber criminals - with 93% of Operational Technologyorganizations experiencing an intrusion in the past 12 months - the report uncovered widespread gaps in industrial security and indicated opportunities for improvements. Key findings of the report include:

  • OT activities lack centralized visibility, increasing security risks. The Fortinet report found that only 13% of respondents have achieved centralized visibility of all OT activities. Additionally, only 52% of organizations are able to track all OT activities from the security operations center (SOC). At the same time, 97% of global organizations consider OT a moderate or significant factor in their overall security risk. The report findings indicate that the lack of centralized visibility contributes to organizations' OT security risks and weakened security posture.

  • OT security intrusions significantly impact organizations' productivity and their bottom line. The Fortinet report found that 93% of OT organizations experienced at least one intrusion in the past 12 months and 78% had more than three intrusions. As a result of these intrusions, nearly 50% of organizations suffered an operation outage that affected productivity with 90% of intrusions requiring hours or longer to restore service. Additionally, one-third of respondents saw revenue, data loss, compliance and brand-value impacted as a result of security intrusions.

  • Ownership of OT security is not consistent across organizations. According to the Fortinet report, OT security management falls within a range of primarily director or manager roles, ranging from the Director of Plant Operations to Manager of Manufacturing Operations. Only 15% of survey respondents say that the CISO holds the responsibility for OT security at their organization.
  • OT security is gradually improving, but security gaps still exist in many organizations. When asked about the maturity of their organization's OT security posture, only 21% of organizations have reached level 4, which includes leveraging orchestration and management. Notably, a larger proportion of Latin America and APAC respondents have reached level 4 compared to other regions. More than 70% of organizations are in the middle levels toward having a mature OT security posture. At the same time, organizations face challenges with using multiple OT security tools, further creating gaps in their security posture. The report found that a vast majority of organizations use between two and eight different vendors for their industrial devices and have between 100 and 10,000 devices in operation, adding complexity.

OT Security is a Corporate-Level Concern
As OT systemsincreasingly become targets for cyber criminals, C-level leaders recognize the importance of securing these environments to mitigate risks to their organizations. Industrial systems have become a significant risk factor since these environments were traditionally air-gapped from IT and corporate networks, but now these two infrastructures are becoming universally integrated. With industrial systems now being connected to the internet and more accessible from anywhere, organizations' attack surface is increasing significantly.

With the IT threat landscape becoming more sophisticated, connected OT systems have also become vulnerable to these growing threats. This combination of factors is moving industrial security upward in many organizations' risk portfolio. OT security is a growing concern for executive leaders, increasing the need for organizations to move toward full protection of their industrial control system (ICS) and supervisory control and data acquisition (SCADA) systems.

Best Practices to Overcome OT Security Challenges
Fortinet's global 2022 State of Operational Technology and Cybersecurity Reportindicated ways organizations can address OT systems' vulnerabilities and strengthen their overall security posture. Organizations can address their OT security challenges by:

  • Establish Zero Trust Access to prevent breaches. With more industrial systems being connected to the network, Zero Trust Access (https://www.fortinet.com/resources/cyberglossary/zero-trust-edge?utm_source=pr&utm_campaign=zero-trust-edge) solutions ensure that any user, device or applications without proper credentials and permissions are denied access to critical assets. To advance OT security efforts, Zero Trust Access solutions can further defend against both internal and external threats.

  • Implementing solutions that provide centralized visibility of OT activities. Centralized, end-to-end visibility of all OT activities is key to ensuring organizations strengthen their security posture. According to Fortinet's report (https://www.fortinet.com/resources-campaign/research-papers/2022-the-state-of-operational-technology-and-cybersecurity), top-tier organizations - which make up the 6% of respondents who reported no intrusions in the past year - were more than three times as likely to have achieved centralized visibility than their counterparts who suffered intrusions.

  • Consolidating security tools and vendors to integrate across environments. To remove complexity and help achieve centralized visibility of all devices, organizations should look to integrate their OT and IT technology across a smaller number of vendors. By implementing integrated security solutions (https://www.fortinet.com/solutions/enterprise-midsize-business/security-fabric.html?utm_source=pr&utm_campaign=security-fabric), organizations can reduce their attack surface and improve their security posture.

  • Deploying network access control (NAC) technology. Organizations that avoided intrusions in the past year were more likely to have role-based NAC (https://www.fortinet.com/products/network-access-control.html?utm_source=pr&utm_campaign=fortinac) in place, ensuring that only authorized individuals can access specific systems critical for securing digital assets.

Securing OT Environments with the Fortinet Security Fabric
For more than a decade, Fortinet has protected OT environmentsin critical infrastructure sectors such as energy, defense, manufacturing, food, and transportation. By designing security into complex infrastructure via the Fortinet Security Fabric, organizations have an efficient, non-disruptive way to ensure that their OT environment is protected and compliant. With full integration and shared threat intelligence, industrial organizations gain fast, automated responses to attacks in any vector. Fortinet's Security Fabric covers the entire converged IT-OT network to close OT security gaps, deliver full visibility and provide simplified management.

About the Fortinet OT and Cybersecurity Survey:

  • This year's State of Operational Technology and Cybersecurity Report is based on a survey of more than 500 global OT professionals conducted in March 2022.
  • The survey targeted people holding leadership positions responsible for OT and OT security, from managers to C-level executives. Respondents represent a range of industries that are heavy users of OT, including manufacturing, transportation and logistics, and healthcare.

Additional Resources

  • Learn more about the Fortinet OT and Cybersecurity Survey in this blog (https://www.fortinet.com/blog/industry-trends/ot-cybersecurity-report-outlines-key-challenges-for-industrial-organizations).
  • Learn more (https://www.fortinet.com/solutions/industries/scada-industrial-control-systems) about securing critical infrastructures with Fortinet.
  • Watch (https://youtu.be/C5PuGKKNzpU) how Fortinet makes possible a digital world you can always trust, and view (https://www.youtube.com/watch?v=x8US5w7D5Mc) how the Fortinet Security Fabric (https://www.fortinet.com/solutions/enterprise-midsize-business/security-fabric.html?utm_source=pr&utm_campaign=security-fabric) platform delivers broad, integrated, and automated protection across an organization's entire digital infrastructure.
  • Read more about how Fortinet customers (https://www.fortinet.com/customers.html?utm_source=pr&utm_campaign=customers) are securing their organizations.
  • Learn more about FortiGuard Labs (https://www.fortinet.com/fortiguard/labs?utm_source=pr&utm_campaign=FortiGuardLabs) threat intelligence and research or Outbreak Alerts (https://www.fortinet.com/fortiguard/outbreak-alert?utm_source=pr&utm_campaign=outbreak-alert), which provide timely steps to mitigate breaking cybersecurity attacks. Read more about Fortinet's FortiGuard security services portfolio (https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/fortiguard-subscriptions?utm_source=pr&utm_campaign=fortiguard-subscriptions).
  • Learn more about Fortinet's free cybersecurity training (https://www.fortinet.com/training/cybersecurity-professionals?utm_source=blog&utm_campaign=freetraining) initiative, which includes broad cyber awareness and product training. As part of the Fortinet Training Advancement Agenda (TAA) (https://www.fortinet.com/training/taa?utm_source=pr&utm_campaign=taa), the Fortinet Training Institute also provides training and certification through the Network Security Expert (NSE) Certification (https://www.fortinet.com/training-certification?utm_source=blog&utm_campaign=cert), Academic Partner (https://www.fortinet.com/training/security-academy-program?utm_source=blog&utm_campaign=academy), and Education Outreach (https://www.fortinet.com/training/education-outreach-program?utm_source=blog&utm_campaign=education) programs.
  • Engage in the Fortinet User Community (Fuse) (https://fusecommunity.fortinet.com/home?utm_source=pr&utm_campaign=fuse-community). Share ideas and feedback, learn more about our products and technology, and connect with peers.
  • Follow Fortinet on Twitter (https://twitter.com/Fortinet), LinkedIn (https://www.linkedin.com/company/fortinet), Facebook (https://www.facebook.com/fortinet/), and Instagram (https://www.instagram.com/behindthefirewall/). Subscribe to Fortinet on YouTube (https://www.youtube.com/channel/UCJHo4AuVomwMRzgkA5DQEOA'sub_confirmation=1).

About Fortinet
Fortinet, the Fortinet Blog, or FortiGuard Labs.

Copyright © 2022 Fortinet, Inc. All rights reserved. The symbols and denote respectively federally registered trademarks and common law trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, the Fortinet logo, FortiGate, FortiOS, FortiGuard, FortiCare, FortiAnalyzer, FortiManager, FortiASIC, FortiClient, FortiCloud, FortiCore, FortiMail, FortiSandbox, FortiADC, FortiAI, FortiAP, FortiAppEngine, FortiAppMonitor, FortiAuthenticator, FortiBalancer, FortiBIOS, FortiBridge, FortiCache, FortiCall, FortiCam, FortiCamera, FortiCarrier, FortiCASB, FortiCenter, FortiCentral, FortiConnect, FortiController, FortiConverter, FortiCWP, FortiDB, FortiDDoS, FortiDeceptor, FortiDirector, FortiDNS, FortiEDR, FortiExplorer, FortiExtender, FortiFirewall, FortiFone, FortiGSLB, FortiHypervisor, FortiInsight, FortiIsolator, FortiLocator, FortiLog, FortiMeter, FortiMoM, FortiMonitor, FortiNAC, FortiPartner, FortiPenTest, FortiPhish, FortiPortal, FortiPresence , FortiProtect, FortiProxy, FortiRecorder, FortiReporter, FortiSASE, FortiScan, FortiSDNConnector, FortiSIEM, FortiSDWAN, FortiSMS, FortiSOAR, FortiSwitch, FortiTester, FortiToken, FortiTrust, FortiVoice, FortiVoIP, FortiWAN, FortiWeb, FortiWiFi, FortiWLC, FortiWLCOS and FortiWLM.

Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, contract, binding specification or other binding commitment by Fortinet or any indication of intent related to a binding commitment, and performance and other specification information herein may be unique to certain environments. This news release may contain forward-looking statements that involve uncertainties and assumptions, such as statements regarding technology releases among others. Changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialize or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements.

Media Contact: Investor Contact: Analyst Contact:
Stephanie Lira Peter Salkowski Rebecca Bergman
Fortinet, Inc. Fortinet, Inc. Fortinet, Inc.
408-235-7700 408-331-4595 650-554-0941
pr@fortinet.com (mailto:pr@fortinet.com) psalkowski@fortinet.com (mailto:psalkowski@fortinet.com) analystrelations@fortinet.com (mailto:analystrelations@fortinet.com)

© 2022 GlobeNewswire (Europe)
Zeitenwende! 3 Uranaktien vor der Neubewertung
Ende Mai leitete US-Präsident Donald Trump mit der Unterzeichnung mehrerer Dekrete eine weitreichende Wende in der amerikanischen Energiepolitik ein. Im Fokus: der beschleunigte Ausbau der Kernenergie.

Mit einem umfassenden Maßnahmenpaket sollen Genehmigungsprozesse reformiert, kleinere Reaktoren gefördert und der Anteil von Atomstrom in den USA massiv gesteigert werden. Auslöser ist der explodierende Energiebedarf durch KI-Rechenzentren, der eine stabile, CO₂-arme Grundlastversorgung zwingend notwendig macht.

In unserem kostenlosen Spezialreport erfahren Sie, welche 3 Unternehmen jetzt im Zentrum dieser energiepolitischen Neuausrichtung stehen, und wer vom kommenden Boom der Nuklearindustrie besonders profitieren könnte.

Holen Sie sich den neuesten Report! Verpassen Sie nicht, welche Aktien besonders von der Energiewende in den USA profitieren dürften, und laden Sie sich das Gratis-PDF jetzt kostenlos herunter.

Dieses exklusive Angebot gilt aber nur für kurze Zeit! Daher jetzt downloaden!
Werbehinweise: Die Billigung des Basisprospekts durch die BaFin ist nicht als ihre Befürwortung der angebotenen Wertpapiere zu verstehen. Wir empfehlen Interessenten und potenziellen Anlegern den Basisprospekt und die Endgültigen Bedingungen zu lesen, bevor sie eine Anlageentscheidung treffen, um sich möglichst umfassend zu informieren, insbesondere über die potenziellen Risiken und Chancen des Wertpapiers. Sie sind im Begriff, ein Produkt zu erwerben, das nicht einfach ist und schwer zu verstehen sein kann.