Claroty

Introduction

Claroty is a supplier of OT cybersecurity solutions focused on industrial automation, critical infrastructure and Cyber-Physical Systems. The platform provides functionality for asset discovery, network monitoring, threat detection, risk management and secure remote access within industrial environments.

Claroty is used in:

  • production environments
  • energy infrastructure
  • water treatment
  • oil and gas
  • pharmaceuticals
  • building management systems
  • transport sector
  • healthcare

In modern IT OT Convergence architectures, Claroty helps organisations gain visibility and control over complex OT and ICS networks.

The platform specifically targets industrial protocols, legacy systems and operational continuity, where minimal disruption of production processes is essential.


πŸ—οΈ Positioning in OT security

Claroty positions itself primarily within:

Unlike traditional IT security tools, Claroty takes OT-specific requirements into account such as:

  • real-time communication
  • legacy protocols
  • high availability
  • limited maintenance windows
  • safety requirements
  • deterministic networks

The platform is therefore specifically designed for industrial environments where standard IT scanning often causes operational risks.


🌐 Claroty architecture

A Claroty implementation typically consists of several components.

Key elements:

Component Function
CTD Platform monitoring and detection
sensors network visibility
management console central management
secure remote access external access
analytics engine risk analysis

The solution is typically integrated within:

Claroty is generally placed at higher layers of the Purdue Model so that real-time control traffic is not disrupted.


πŸ”Ž Asset Discovery

One of Claroty’s core capabilities is Asset Discovery.

The platform automatically identifies:

  • PLC
  • HMI
  • industrial switches
  • SCADA servers
  • engineering workstations
  • sensors
  • IoT devices
  • network components

Key data collected:

Data Example
manufacturer Siemens, ABB
firmware version device lifecycle
protocol use Modbus, OPC UA
network relations communication paths
vulnerabilities known CVEs

This is essential because many organisations lack a complete overview of their OT assets.


πŸ“‘ Passive monitoring

Claroty primarily uses passive monitoring to analyse OT networks safely.

This means:

  • no active scans
  • minimal disruption
  • real-time network visibility
  • protocol analysis via SPAN/TAP

Supported protocols include:

Passive monitoring is crucial in industrial environments where active scanning can lead to:

  • PLC faults
  • network disruption
  • crashes
  • safety risks
  • production stops

🧠 Deep Packet Inspection

Claroty uses extensive DPI techniques for industrial protocols.

This allows systems to:

  • analyse OT commands
  • detect protocol anomalies
  • recognise configuration changes
  • flag unauthorised communication

Detection examples:

Detection Risk
firmware upload sabotage
unknown engineering station unauthorised access
new PLC rogue device
protocol anomalies attack or fault

DPI in OT requires deep protocol understanding due to vendor-specific implementations.


⚠️ Threat detection

Claroty detects OT-related threats and anomalies.

Key detection areas:

  • Malware
  • Ransomware
  • lateral movement
  • protocol abuse
  • unauthorised engineering access
  • configuration changes
  • anomalous network flows

Detections are often mapped to:

The platform supports integrations with:

  • SIEM
  • SOAR
  • SOC platforms
  • incident response workflows

πŸ” Secure Remote Access

Claroty also offers secure remote access functionality for vendors and engineers.

Key functions:

Functionality Purpose
MFA strong authentication
session recording auditing
least privilege restricted access
approval workflows controlled access
logging compliance

Remote access is an important focus area in OT because vendors often need access to:

  • PLC
  • SCADA systems
  • engineering stations
  • industrial networks

Insufficiently secured remote access is a major risk in industrial environments.


🏭 Claroty in industrial environments

Claroty is often deployed in environments with:

  • legacy systems
  • mixed vendor landscapes
  • limited documentation
  • insufficient segmentation
  • critical production processes

Typical assets:

Asset type Examples
PLCs Siemens, Rockwell
DCS ABB, Honeywell
HMI SCADA platforms
network equipment industrial switches
OT servers Historian, engineering

The platform helps organisations expose hidden dependencies.


πŸ›‘οΈ Vulnerability management

Claroty supports OT-specific Vulnerability Management.

Key challenges within OT:

  • limited patching options
  • legacy systems
  • vendor dependencies
  • operational downtime
  • safety validation

Claroty therefore focuses not only on patching but also on:

  • compensating controls
  • network segmentation
  • exposure reduction
  • risk scoring

This better matches OT reality than classic IT patching strategies.


🌩️ Cloud and XIoT

Claroty uses the term XIoT for extensive connected environments.

This includes:

  • ICS
  • IoT devices
  • building management systems
  • medical equipment
  • industrial networks

More and more organisations connect OT systems to:

  • cloud analytics
  • remote operations
  • AI platforms
  • predictive maintenance

This increases the need for continuous OT monitoring.


⚑ Performance and network impact

In OT environments, network stability is crucial.

Claroty is designed to:

  • cause minimal network load
  • operate passively
  • deliver real-time insight
  • analyse OT protocols safely

Important considerations:

Aspect Importance
Latency real-time behaviour
jitter process stability
packet loss communication loss
SPAN capacity monitoring quality

Incorrectly designed monitoring architectures can themselves cause operational problems.


πŸ”„ Integration with SOC and IT security

Claroty often integrates with existing IT security platforms.

Examples:

  • SIEM
  • SOAR
  • XDR
  • vulnerability scanners
  • CMDB platforms
  • ticketing systems

This creates better insight into:

  • IT/OT relationships
  • lateral movement
  • supply-chain risks
  • attack chains

The integration supports joint collaboration between:

  • OT engineering
  • SOC teams
  • IT security
  • operations

πŸ§ͺ Practical example: water treatment plant

A water treatment plant implements Claroty for OT visibility.

Architecture

Layer Component
Level 0 sensors and pumps
Level 1 PLCs
Level 2 SCADA
Level 3 Historian
Level 3.5 Claroty monitoring
Level 4 SOC/SIEM

Functionality

Claroty detects:

  • new assets
  • unauthorised laptops
  • firmware changes
  • suspicious network flows
  • remote access activity

Security challenges

Key risks:

  • legacy PLCs
  • insufficient segmentation
  • shared accounts
  • vendor remote access
  • limited patching options

Architectures are therefore designed according to:


πŸ”„ Lifecycle Management

Claroty supports organisations in Lifecycle Management of OT assets.

Key insights:

  • end-of-life systems
  • firmware ageing
  • unsupported assets
  • vulnerabilities
  • configuration changes

This helps organisations with:

  • risk assessments
  • migration planning
  • compliance
  • investment decisions

βš–οΈ Relevant standards

Claroty is often used within compliance and security programmes based on:

Standard Relevance
IEC 62443 OT security
NIST SP 800-82 ICS security
NIST CSF cybersecurity governance
ISO 27001 information security
NIS2 critical infrastructure
ISA-95 IT/OT integration

πŸ“ˆ Role in IT/OT convergence

Claroty plays an important role in modern OT security architectures.

Key trends:

  • growing IT/OT integration
  • cloud connectivity
  • remote operations
  • AI analytics
  • converged SOCs
  • XIoT security

Benefits:

  • better OT visibility
  • risk reduction
  • faster detection
  • improved compliance
  • better asset management

Challenges:

  • complexity
  • legacy infrastructure
  • scalability
  • false positives
  • vendor diversity

Claroty is thus an important platform for modern OT cybersecurity and industrial visibility.