The Asset Inventory Service improves the cybersecurity of your operational technology (OT) and cooperates with versiondog and all standard automation devices used by your OT ecosystem. The monitoring system contains OT asset identification in the form of an active or passive scan, a network risk analysis as well as the ability to identify vulnerabilities and cyberattacks.
The basis for your smart factory – intelligent protection for your OT
Automatic asset detection thanks to active/passive scans as well as import of connected devices from versiondog
- ASSET MANAGEMENT
Manage the data of all your OT assets even if they are connected or not connected to versiondog
- RISK & VULNERABILITY SCORE
Detailed information about risk levels and vulnerabilities for all of your assets
The devices connected in versiondog are automatically updated and added to the existing list along with all existing information. You can also detect any assets (using the active or passive scan of your network) that are not backed up in versiondog at present and therefore not included in your disaster recovery plan. All identified assets will be automatically added to your central inventory list.
Here’s how you can easily eliminate gaps in your disaster recovery strategy.
Manage all of your critical infrastructure assets automatically in a central inventory list. Thanks to the additional detailed information from versiondog, you will receive a clear and straightforward allocation.
Receive all important information (e.g. firmware versions) concerning your critical assets at a glance.
Ensure your device data is up-to-date thanks to the latest common vulnerabilities and exposures (CVE) data and gain access to an extensive library of insecure protocols, misconfigurations and other vulnerable security points.
Gain an automatic assessment of all vulnerabilities, affected assets and the entire industrial network.
Single Source of Truth
Gain overall device transparency as well as automatic device inventory with comprehensive information about hardware, firmware, model, rack slot, IP, manufacturer, etc.
Expanded disaster recovery
Identify additional critical network assets not included in your disaster recovery plan and ensure future backups.
Centralized access, management, and reporting for all assets, including vulnerability and risk assessment.
Reduce total operation costs
Increase productivity, process streamlining and avoid human error. Thanks to reduced manual effort and simplified reporting you achieve more time to concentrate on more important matters.
On the OT Security Summit for Automated Industries Mor Bikovsky from Claroty and AUVESY’s CEO Dr. Tim Weckerle launched their latest solution Asset Inventory Service powered by Claroty.
This comprehensive service offers Asset Detection, a Risk & Vulnerability score and Asset Management.
At the heart of the Asset Inventory Service is the Asset list – this is where all assets in your OT ecosystem are brought together and managed centrally.
1. Automatic transfer of assets present in versiondog
Assets already available in versiondog are imported into the asset list. During this process, the project data available in versiondog is automatically read in and all asset data contained therein is added. Metadata from versiondog, such as a component path or the latest version, are also saved to facilitate asset assignment. Import is performed automatically after a relevant change (e.g., Check-In of a component or (optionally) after each job execution).
2. Perform an active or passive scan of your network
Additional assets belonging to your OT ecosytsem, but which are not yet present in versiondog as components, can be identified and added via an active/passive scan. Vulnerabilities and possible attacks are then determined from all identified assets and the associated information and data.
All identified network assets, which are not yet secured in versiondog, can be automatically imported into versiondog to extend your disaster recovery coverage.
The passive scan is a non-intrusive method achieved by analyzing artefacts. This approach is the least intrusive because the scan only "reads along" and does not interfere with the network. It provides immediate insight and can detect suspicious behavior (attacks or errors) based on device communications. Furthermore, multiple networks can be monitored simultaneously without the need for them to be connected to each other. This method is characterized by ease of use and speed.
The active scan is unique in that it uses both well-known IT-based queries and detection methods such as SNMP queries and proprietary queries. The unique OEM method of querying these assets is used to ensure the highest level of security. The Asset Inventory Service has broad protocol coverage and has developed specialized engines to query each OT asset according to its specific model and vendor.
Experience the Asset Inventory Service live - with using your own data
During our 45-minute web demo, we will present to you all the benefits of the Asset Inventory Service with the option of using your own data.
What you can expect from us:
Provide us with an automation project that corresponds to one of the devices listed below. Our experts will analyze it using the Asset Inventory Service and provide you with valuable insights such as current CVEs of your devices, risks, and vulnerabilities, all in a personal online presentation.
What we require from you:
Create a project file from one of these devices and send it to us as a zip file using our online form:
- Siemens TIA Portal
- Siemens SIMATIC STEP 7
- Siemens PCS7
- Siemens WinCC
- GE Proficy ME
- B&R Automation Studio
- MITSUBISHI GX Works 3
- Omron CX-Programmer
- Rockwell Automation RSLogix 5000
- Schneider PL7 Pro
Your data is safe with us! After the presentation, all data and files will be deleted.
Naturally, you can also book a date without uploading your own project, in which case ,we will use our own sample data to demonstrate the functionality of the Asset Inventory Service.