CounterCraft was named a Cool Vendor in the 2021 Gartner® Cool Vendors™ in Cyber-Physical Systems Security: Novel Approaches Enter the Scene report. We believe recognition as a Cool Vendor in this sector is a huge validation for the CounterCraft technology and team.
Gartner® Cool Vendor Reports evaluate new, interesting and innovative vendors, products, and services.
Cyber-physical systems are truly one of the most challenging systems to protect in the realm of cybersecurity. Cyber Physical Systems (CPS) are integration of computation, networking and physical process and are very complex, especially when several CPS need to be combined. That is the case for example in an airport or a large factory, where many machines have to work together to achieve a common goal.
Gartner® subscribers can download the Gartner® Cool Vendor Report here.
Cyber-physical systems, whether born out of OT/IT convergence,IoT, IIoT or smart cities/buildings/grids efforts, are found in sectors as diverse as aerospace, automotive, chemical processes, civil infrastructure, energy, healthcare, manufacturing, transportation, entertainment, and consumer appliances.
CounterCraft’s deception-powered solution delivers threat intelligence that is both timely and specific to an organization. The ability to simulate real environments and processes gives CounterCraft a unique edge when it comes to defending these infrastructures. Real systems are protected as the threat actor is pulled into deception environments to carry out their malicious actions. Deception environments can even be deployed externally, to great effect.
Watch our founders talking about the role deception can play in protecting operational technology. Find out more about boosting OT cybersecurity with deception in this blogpost, including three different scenarios in which we explain how deception can create credible environments and even simulate real processes in order to turn the tables on attackers.
Deception technology is maturing as a market, and some of the world’s most demanding customers are using it. The potential it has to identify attackers quickly and enable organizations to adjust their security response. Contact us for a demo.
Gartner® and Cool Vendors are registered trademarks of Gartner®, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved Gartner® does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner® research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner® disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.