{"id":1811,"date":"2024-11-05T09:21:19","date_gmt":"2024-11-05T09:21:19","guid":{"rendered":"https:\/\/inprotech.es\/?p=1811"},"modified":"2025-02-17T10:28:41","modified_gmt":"2025-02-17T10:28:41","slug":"vulnerability-scanner-in-ot-networks","status":"publish","type":"post","link":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/","title":{"rendered":"Vulnerability scanner in OT networks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A vulnerability scanner is a piece of software whose role is to make an inventory of assets within a network, and to carry out more or less automated probes within these to detect vulnerable applications, resources or systems. It is, therefore, a non- negotiable part of the secure software development life cycle (SDLC)<\/span><span style=\"font-weight: 400;\">a<\/span><span style=\"font-weight: 400;\">. An authoritative definition of vulnerability, in the context of software development, is that given by the American National Institute of Standards and Technology, NIST:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u00abA weakness in the computational logic (for example, in the code itself) of software and hardware components that, if exploited, would lead to a negative impact on confidentiality, integrity or availability. Mitigation of vulnerabilities in this context typically involves code reviews, but also changes in specifications or discontinuities (such as the withdrawal of entire protocols or functionalities)\u00bb<\/span><\/i><i><span style=\"font-weight: 400;\">b<\/span><\/i><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n\n<p><span style=\"font-weight: 400;\">Software development is a strongly community-oriented enterprise: much of the code written is produced with a public service vocation, and contains or uses code written by others. It is therefore desirable to maintain a publicly accessible, professionally curated list of all detected vulnerabilities, a task undertaken by the US in its role as the technological power of the 20th century. In 1999, MITRE, a non-profit corporation funded by several federal research and development centers, inaugurated the CVE (Common Vulnerabilities and Exposures) List. CVEs follow a naming<\/span><\/p>\n<p><span style=\"font-weight: 400;\">system to uniquely identify a given vulnerability, which has the form CVE- 2022-001122. They also have a standardized publication system, or life cycle, that goes from the discovery of the vulnerability by a user to its publication on the list<\/span><span style=\"font-weight: 400;\">c<\/span><span style=\"font-weight: 400;\">. Years later, in 2005, NIST launched the NVD (National Vulnerability Database) with the idea of enriching the CVE List with additional information such as a numerical score of the vulnerability risk or the availability of patches. This standardization of vulnerabilities helps to promote the use of scanners, as it establishes a common language and confidence in the process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Both IT (Information Technology) and OT (Operational Technology) networks, where industrial networks would be found, need acceptable security standards to maintain their long-term operability, but their different nature means that the tools appropriate for one are not appropriate for the other. In addition to the fact that the protocols used in internal communications are usually different, the priorities to be maintained are very different in both cases: in industrial environments it is essential to maintain the continuity of production and any interruption in communications or availability of any node in the network can cause global shutdowns. This means that scans have to be carried out with much more care than in an IT network, where occasional downtime is accepted as normal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the importance of having a specific vulnerability management tool in the context of OT networks, at InprOTech we have developed tools to conveniently equip our InprOTech Guardian monitoring solution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">InprOTech Guardiand is a cybersecurity tool designed and developed for industrial networks. Its main function is to monitor the traffic generated by the factory\u00a0 and\u00a0 analyse\u00a0 it\u00a0 based\u00a0 on\u00a0 a <\/span><span style=\"font-weight: 400;\">combination of static, community and AI-powered rules, from which alerts can be deployed directly to plant managers and\/or operators and thus cut off any attack or malfunction that may be occurring. In addition to these main capabilities, InprOTech Guardian also offers its own vulnerability scanner, which allows them to be detected, visualised and managed in a comprehensive manner.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1803 aligncenter\" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/unnamed.jpg\" alt=\"\" width=\"700\" height=\"237\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/unnamed.jpg 1219w, https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/unnamed-300x102.jpg 300w, https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/unnamed-1024x347.jpg 1024w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<h2><\/h2>\n<h2><b>Development<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A vulnerability scanner should be able, in general terms, to (1) obtain a list of the assets in the network, (2) detect vulnerabilities in them, (3) classify them and provide relevant information about them, (4) generate reports and statistics, and (5) manage these vulnerabilities. Below, we discuss these points in more detail, focusing on our approach:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Scanning assets in the network: <\/b><span style=\"font-weight: 400;\">lists the devices present in an environment. This is one of the core functionalities of InprOTech Guardian, which allows obtaining an enriched inventory of the nodes present in the network in real time. In addition, administrators and operators can mark some devices based on their criticality for the operation of the network (critical devices will not be scanned to <\/span>avoid possible interruptions or alterations).<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vulnerability detection: <\/b><span style=\"font-weight: 400;\">obtains information about the open services and ports, operating systems, firmware, installed on said non-critical assets. Using CPE (Common Platform Enumeration) tags, another standard that identifies software products plus their version, it obtains information on existing vulnerabilities from public databases such as NVD.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Classification and intelligence: <\/b><span style=\"font-weight: 400;\">enriches the previous search with extra information that allows you to classify vulnerabilities by severity, a summary that explains the nature of the vulnerability in a few lines, and links to further investigate possible mitigations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Generation of reports and statistics: <\/b><span style=\"font-weight: 400;\">transfers all this data to a format that is easy for a human to read and process. Specifically, a list in csv format with the list of vulnerabilities and their most important properties, and in the application itself, general statistics (scan coverage, number of vulnerabilities by severity and general risk levels&#8230;), as well as those focused on the devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vulnerability management: <\/b><span style=\"font-weight: 400;\">the user can manage the status of the different vulnerabilities: active, resolved, silenced or false positive. In<\/span>addition, in the short term we will provide InprOTech Guardian with the ability to, using the valuable information provided by the vulnerability scanner, communicate with the network firewall to report the need to block certain connections in the event that a critical risk is detected.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>There are very mature solutions on the market that also offer these services from the great dominators in the field of cybersecurity, such as Nessus, Tenable&#8217;s OT scanner, or OpenVAS, from Greenbone. These two options dominate a large part of the market, but they are more focused on clients with sufficient size to have dedicated teams, capable of handling these very powerful but also complex tools with ease.<\/p>\n<p>InprOTech Guardian offers the possibility of integrating the results of an external vulnerability scanner, for the moment with compatibility with Nessus and OpenVAS.<\/p>\n<h2><\/h2>\n<h2><b>Benefits<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Although they have been discussed more or less extensively throughout this article, let us highlight the strengths of InprOTech Guardian&#8217;s Smart View as a vulnerability scanner:<\/span><\/p>\n<ul>\n<li><b>Asset control: <\/b><span style=\"font-weight: 400;\">to identify them, appropriately segment networks, discover inconsistencies between the <\/span>network design in theory and in the factory itself.<\/li>\n<li><b>Risk identification: <\/b><span style=\"font-weight: 400;\">even when the vulnerabilities detected are not critical, attacking and resolving them can lead to an improvement in code quality.<\/span><\/li>\n<li><b>Threat mitigation: <\/b><span style=\"font-weight: 400;\">in cybersecurity, you can never be confident of having an impregnable network, but you should aim to discover as many weak points as possible, in order to later calculate whether it is worth mitigating them.<\/span><\/li>\n<li><b>Regulatory compliance: <\/b><span style=\"font-weight: 400;\">ensuring that the systems running on the network are free of known vulnerabilities is an important step towards compliance with European laws and directives (such as NIS2, which will come into force in October of this year 2024).<\/span><\/li>\n<li><b>Affordable and customized solution: <\/b><span style=\"font-weight: 400;\">Since our target customers <\/span>are small and medium-sized companies that have decided to take the cybersecurity of their industrial environments seriously, the service we offer with InprOTech Guardian is one of direct communication and flexibility to adapt the product to the needs and preferences of the client. In addition, by focusing on the most central points of what a vulnerability scanner needs, we can adjust the cost of the service.<\/li>\n<\/ul>\n<h2><\/h2>\n<h2><b>Why InprOTech Guardian?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u2726 <\/span><span style=\"font-weight: 400;\">Simple to use and intuitive web interface. For any user, whether skilled or not. Really.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2726 <\/span><span style=\"font-weight: 400;\">Affordable. For any customer segment and company.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2726 <\/span><span style=\"font-weight: 400;\">Flexible. Our services come in many flavors, directly acting as vendor or service provider, or through partnerships with 3rd parties.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2726 <\/span><span style=\"font-weight: 400;\">Customizable. We work with our customers to develop new use cases and features.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2726 <\/span><span style=\"font-weight: 400;\">Geostrategically compliant. 100% EU made (R&amp;D, development and support), giving EU-customers confidence in supply chain compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2726 <\/span><span style=\"font-weight: 400;\">Agility. We care, and we work quickly.<\/span><\/p>\n<h2><\/h2>\n<h2><b>Summary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In conclusion, the development of Smart View in InprOTech Guardian covers the need for a vulnerability scanner that allows obtaining reliable information and management options for them for industrial networks. It combines the power of both public databases, which contain all the relevant information, and the import of external vulnerability scanners, with the flexibility of customizing the query parameters and the assets to be scanned.<\/span><\/p>\n<h1><b>Resources<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">[a]<\/span><a href=\"http:\/\/www.redhat.com\/es\/topics\/security\/software-development-lifecycle-security\"><i><span style=\"font-weight: 400;\">www.redhat.com\/es\/topics\/security\/soft<\/span><\/i><\/a> <a href=\"http:\/\/www.redhat.com\/es\/topics\/security\/software-development-lifecycle-security\"><i><span style=\"font-weight: 400;\">ware-development-lifecycle-security<\/span><\/i><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[b]<\/span><a href=\"https:\/\/nvd.nist.gov\/vuln\"><i><span style=\"font-weight: 400;\">https:\/\/nvd.nist.gov\/vuln<\/span><\/i><\/a><\/p>\n<p><span style=\"font-weight: 400;\">[c]<\/span><i><span style=\"font-weight: 400;\">https:\/\/<\/span><\/i><a href=\"http:\/\/www.cve.org\/About\/Process#CV\"><i><span style=\"font-weight: 400;\">www.cve.org\/About\/Process#CV<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> ERecordLifecycle <\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">[d]<\/span><a href=\"http:\/\/www.inprotech.es\/guardian\"><span style=\"font-weight: 400;\">inprotech.es\/guardian<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability scanner is a piece of software whose role is to make an inventory of assets within a network, and to carry out more or less automated probes within these to detect vulnerable applications, resources or systems. It is, therefore, a non- negotiable part of the secure software development life cycle (SDLC)a. An authoritative&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1808,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[49,17],"tags":[],"class_list":["post-1811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guardian-en","category-techpapers-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability scanner in OT networks - InprOTech<\/title>\n<meta name=\"description\" content=\"Discover how InprOTech Guardian&#039;s vulnerability scanner protects industrial networks by identifying and managing security risks in real-time. Our tool combines advanced technology with an intuitive interface to ensure operational continuity, offering an affordable and tailored approach for small and medium-sized businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability scanner in OT networks - InprOTech\" \/>\n<meta property=\"og:description\" content=\"Discover how InprOTech Guardian&#039;s vulnerability scanner protects industrial networks by identifying and managing security risks in real-time. Our tool combines advanced technology with an intuitive interface to ensure operational continuity, offering an affordable and tailored approach for small and medium-sized businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"InprOTech\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-05T09:21:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T10:28:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/Escaner-de-vulnerabilidades-en-redes-OT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"headline\":\"Vulnerability scanner in OT networks\",\"datePublished\":\"2024-11-05T09:21:19+00:00\",\"dateModified\":\"2025-02-17T10:28:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/\"},\"wordCount\":1385,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Escaner-de-vulnerabilidades-en-redes-OT.jpg\",\"articleSection\":[\"Guardian\",\"Techpapers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/\",\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/\",\"name\":\"Vulnerability scanner in OT networks - InprOTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Escaner-de-vulnerabilidades-en-redes-OT.jpg\",\"datePublished\":\"2024-11-05T09:21:19+00:00\",\"dateModified\":\"2025-02-17T10:28:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"description\":\"Discover how InprOTech Guardian's vulnerability scanner protects industrial networks by identifying and managing security risks in real-time. Our tool combines advanced technology with an intuitive interface to ensure operational continuity, offering an affordable and tailored approach for small and medium-sized businesses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Escaner-de-vulnerabilidades-en-redes-OT.jpg\",\"contentUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Escaner-de-vulnerabilidades-en-redes-OT.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanner-in-ot-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/inprotech.es\\\/en\\\/pagina-de-inicio\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability scanner in OT networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\",\"url\":\"https:\\\/\\\/inprotech.es\\\/\",\"name\":\"InprOTech\",\"description\":\"The Cybersecurity Solution for the Industrial Environment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/inprotech.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/inprotech.es\"],\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/author\\\/moon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability scanner in OT networks - InprOTech","description":"Discover how InprOTech Guardian's vulnerability scanner protects industrial networks by identifying and managing security risks in real-time. Our tool combines advanced technology with an intuitive interface to ensure operational continuity, offering an affordable and tailored approach for small and medium-sized businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability scanner in OT networks - InprOTech","og_description":"Discover how InprOTech Guardian's vulnerability scanner protects industrial networks by identifying and managing security risks in real-time. Our tool combines advanced technology with an intuitive interface to ensure operational continuity, offering an affordable and tailored approach for small and medium-sized businesses.","og_url":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/","og_site_name":"InprOTech","article_published_time":"2024-11-05T09:21:19+00:00","article_modified_time":"2025-02-17T10:28:41+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/Escaner-de-vulnerabilidades-en-redes-OT.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#article","isPartOf":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/"},"author":{"name":"admin","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"headline":"Vulnerability scanner in OT networks","datePublished":"2024-11-05T09:21:19+00:00","dateModified":"2025-02-17T10:28:41+00:00","mainEntityOfPage":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/"},"wordCount":1385,"commentCount":0,"image":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/Escaner-de-vulnerabilidades-en-redes-OT.jpg","articleSection":["Guardian","Techpapers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/","url":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/","name":"Vulnerability scanner in OT networks - InprOTech","isPartOf":{"@id":"https:\/\/inprotech.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#primaryimage"},"image":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/Escaner-de-vulnerabilidades-en-redes-OT.jpg","datePublished":"2024-11-05T09:21:19+00:00","dateModified":"2025-02-17T10:28:41+00:00","author":{"@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"description":"Discover how InprOTech Guardian's vulnerability scanner protects industrial networks by identifying and managing security risks in real-time. Our tool combines advanced technology with an intuitive interface to ensure operational continuity, offering an affordable and tailored approach for small and medium-sized businesses.","breadcrumb":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#primaryimage","url":"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/Escaner-de-vulnerabilidades-en-redes-OT.jpg","contentUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2024\/11\/Escaner-de-vulnerabilidades-en-redes-OT.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanner-in-ot-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/inprotech.es\/en\/pagina-de-inicio\/"},{"@type":"ListItem","position":2,"name":"Vulnerability scanner in OT networks"}]},{"@type":"WebSite","@id":"https:\/\/inprotech.es\/#website","url":"https:\/\/inprotech.es\/","name":"InprOTech","description":"The Cybersecurity Solution for the Industrial Environment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inprotech.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/inprotech.es"],"url":"https:\/\/inprotech.es\/en\/author\/moon\/"}]}},"_links":{"self":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/comments?post=1811"}],"version-history":[{"count":1,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1811\/revisions"}],"predecessor-version":[{"id":1812,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/1811\/revisions\/1812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media\/1808"}],"wp:attachment":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media?parent=1811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/categories?post=1811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/tags?post=1811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}