To subscribe, advertise or contribute articles to www.asiamanufacturingnewstoday.com contact publisher@xtra.co.nz
  • Home
  • Advertise
  • Subscribe
  • Archives
Asia Manufacturing News
The official site for the Asia Manufacturing News magazine
  • Home
  • AI
  • Analysis
  • Aviation
  • Big Data
  • Business News
  • Calendar
  • Case Studies
  • Change the Conversation
  • Climate Change
  • Covid-19
  • Developments
  • Energy
  • Engineering
  • Events
  • Manufacturing Technology
  • Innovators
  • IoT
  • Manufacturing Technology
  • News
  • Product News
  • Smart Manufacturing
  • The Creative Class
  • The Interview
  • Webinars

News Ticker

$2.3b AI-Focused data center for Jakarta
Building Momentum with Hyster: Koh Kock Leong’s Journey Toward Efficiency and Growth
Time for ASEAN to rethink a single currency amid global trade tensions
Secutech 2025 concludes with optimism and strong affirmation of growth
Zoomlion’s grand debut at 2025 Changsha International Construction Equipment Exhibition
CeMAT Southeast Asia returns to Singapore 
HRS Heat Exchangers, Stand AJ51, ProPak Asia 2025, Bangkok, Thailand
Embracing Automation: Addressing ASEAN’s Manufacturing Challenges

When choosing a technology security solution…


Although some industries may be targeted more often than others for cyberattacks, every organisation across every major industry, from utilities and manufacturing to the public sector, must take necessary security precautions and make cybersecurity a top priority and investment, according to Forescout.

Steve Hunter, senior director for Asia Pacific and Japan, Forescout, said, “Making the best investment with a potentially limited security budget can be a daunting task for security and risk management (SRM) leaders.

No two organisations are identical.

Some of the reasons for this include the fact that no two organisations are identical, which means that security mindset is also different. Cyberthreats are also evolving at a remarkable pace, making it difficult to ensure protection against the latest threats.”

In addition to evolving threats, the cyber landscape is also changing rapidly. Traditional IT networks and infrastructure are becoming increasingly intertwined and connected to operational technology (OT) networks and infrastructure.

Consequently, devices typically limited to the IT environment, if unsecure, can put entire OT networks at risk. Each device expands the attack surface, giving bad actors more opportunities to access the network.

To help businesses and organisations simplify the decision-making process and also minimise the time to deployment, and ultimately a more secured network environment, Forescout has assembled a list of seven key questions, based on key research, that every SRM leader should ask before deciding which security product is the best one for their organisation.

1. Is the solution vendor-agnostic?
Too often, organisations identify what they think will be a security silver bullet, only to discover after purchase and implementation that the product is not compatible with other products or applications on their network.

 More than a poor investment, those organisations also suffer the headache of frustrated end users and wasted resources, and, their organisation is ultimately no more secure than before the purchase was made. It is critical that products are vetted to ensure they are compatible and vendor-agnostic.

2. Does the solution provide asset discovery to enable operational continuity and system integrity?
Asset discovery is a critical foundation for effective defence, as well as ensuring reliable operations.

Often organisations, even those with good asset inventory and asset management practices, will fail to account for every device that’s on their network.

A good security solution will let organisations identify and inventory every connected device on their network in real time, regardless of device type.

3. Does the solution detect and alert on known common vulnerabilities and exposures (CVEs)?
Whitelisting and generic anomaly detection are common OT security approaches. Whilst important, the best approach should include well-mapped OT system CVE discovery for faster detection and to improve risk management from Day 1.

 In today’s cyber terrain, early understanding of an organisation’s OT exposure can mean the difference between headline news and swift remediation and mitigation.

4. Can the solution evolve from mirror mode to in-line security?
Active prevention may be a desired, long-term goal when it comes to monitoring and detection, however many organisations lack either the security maturity or necessary resources to enable such features as part of initial deployment.

 However, as the organisation matures, it’s important to have the option to switch from passive detection to active prevention. Ensuring this feature is available up front will also prevent the need for additional expenses down the road.

5. Does the solution provide IT support in addition to OT?
This question is especially important to ask when seeking to protect an OT environment. Because OT attacks have historically started in the IT environment, then stealthily oved laterally into the OT environment, it’s important to detect IT-originated but OT-targeted attacks before they reach the intended target.

In short, decision-makers should ensure the product is effective in both IT and OT environments.

6. Does the solution support secure IT/OT alignment
? IT-OT convergence is on the rise; yet, the supporting infrastructure and networks differ significantly and can’t be treated the same when it comes to cyber defence.

In other words, the security best practices and technologies that work in an IT environment cannot always be expected to effective, if even possible, in an OT environment. It’s critical, then, that decision-makers evaluate a product not only on its ability to protect both environments, but also on its ability to integrate with other security solutions, protocols, software and hardware.

7. Is the solution designed to live in an OT environment from a hardware or operating environment perspective?
Many solutions are designed to function within the comfort of a temperature-regulated server room with a backup power supply or generator; the type of facility typically provided in IT environments.

OT environments, on the other hand, do not always afford such controlled environments and, as a result, can test the limits of many solutions.

It’s important to account for the environmental conditions where the product will be used and ensure the solution can run in sites requiring support for hazardous environment operations.

Share this:

Related Posts

Solving

Developments /

Solving tapping challenges with smart tooling

Hexagon

Manufacturing Technology /

Hexagon brings automated quality inspection to with  PRESTO Quality Stations

EDGNEX

News /

$2.3b AI-Focused data center for Jakarta

‹ Mini-Computer fully protects your anonymity › Screw compressors with integrated i.HOC rotary dryer

27th July 2025

Recent Posts

  • Solving tapping challenges with smart tooling
  • Reshaping global lubricant supply chains: Trump-Era tariffs driving industry pivot towards Asia
  • India gains trade momentum amid tariff and global supply chain shakeup
  • Sidel’s Beijing Plant unveils large-scale installation advancing green factory initiative
  • $2.3b AI-Focused data center for Jakarta
  • Hexagon brings automated quality inspection to with  PRESTO Quality Stations
  • Building Momentum with Hyster: Koh Kock Leong’s Journey Toward Efficiency and Growth
  • Andersen Consulting expands into Pakistan with collaborating firm NEC Consulting
  • Time for ASEAN to rethink a single currency amid global trade tensions
  • ASEAN-GCC-China collaboration signals growing demand for multilateralism

Categories

  • AI
  • Analysis
  • Aviation
  • Big Data
  • Business News
  • Calendar
  • Case Studies
  • Change the Conversation
  • Climate Change
  • Covid-19
  • Developments
  • Energy
  • Engineering
  • Events
  • Innovators
  • IoT
  • Manufacturing Technology
  • Manufacturing Technology
  • News
  • Product News
  • Smart Manufacturing
  • The Creative Class
  • The Interview
  • Uncategorized
  • Webinars

Archives

Back to Top

  • Home
  • AI
  • Analysis
  • Aviation
  • Big Data
  • Business News
  • Calendar
  • Case Studies
  • Change the Conversation
  • Climate Change
  • Covid-19
  • Developments
  • Energy
  • Engineering
  • Events
  • Manufacturing Technology
  • Innovators
  • IoT
  • Manufacturing Technology
  • News
  • Product News
  • Smart Manufacturing
  • The Creative Class
  • The Interview
  • Webinars

To subscribe, advertise or contribute articles to asiamanufacturingnewstoday.com contact publisher@xtra.co.nz

(c) Asia Manufacturing News, 2025