As Claroty’s first-ever solution, Claroty CTD has earned widespread acclaim among industrial cybersecurity decision-makers and asset owners for its robust capabilities.
CTD isn’t another generic solution. It was purpose-built by experts intimately familiar with the unique security and operational needs of industrial environments
No matter whether you’re new to industrial cybersecurity or seeking to optimize an existing program, CTD will meet you wherever you are on your maturity journey.
Recognizing that not all organizations are ready or able to embrace SaaS solutions, CTD supports on-premises deployments without compromising on ease or flexibility
CTD's native integration with Claroty Secure Remote Access (SRA) enables response and remediation for incidents related to remote user activity.
Effective industrial cybersecurity starts with knowing what needs to be secured. CTD leverages the broadest and deepest industrial protocol coverage in the industry and unmatched Passive, Active, and AppDB discovery capabilities to provide comprehensive industrial visibility via a highly detailed, centralized inventory of all XIoT assets. Claroty is the only vendor that offers this caliber of visibility across the three dimensions integral to effective risk assessment and reduction: asset, session, and processes visibility.
The extensive visibility CTD provides enables it to automatically map and virtually segment industrial networks into Virtual Zones, or logical groups of assets that communicate with one another under normal circumstances. These Virtual Zones enable further features such as empowering CTD’s threat detection capabilities with cross-zone communication violation alerts and integrations with existing firewall and NAC solutions to enforce policy-based segmentation.
CTD automatically compares each asset in your industrial environment to an extensive database of unsecure protocols, known configurations, substandard security practices, and other vulnerabilities tracked by Claroty, as well as to the latest CVE data from the National Vulnerability Database. As a result, users can more effectively identify, prioritize, and remediate vulnerabilities in industrial networks.
CTD utilizes five detection engines to automatically profile all assets, communications, and processes in your industrial environment, generate a behavioral baseline that characterizes legitimate traffic to weed out false positives, and alert you in real-time to known and emerging threats. This results in highly contextualized alert timelines to help you more effectively prioritize threat remediation while reducing alert fatigue.