Best Operational Technology (OT) Security Software for LogRhythm SIEM

Find and compare the best Operational Technology (OT) Security software for LogRhythm SIEM in 2026

Use the comparison tool below to compare the top Operational Technology (OT) Security software for LogRhythm SIEM on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Microsoft Defender for IoT Reviews

    Microsoft Defender for IoT

    Microsoft

    $0.001 per device per month
    Continuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address.
  • 2
    Dragos Platform Reviews
    The Dragos Platform is the most trusted industrial controls systems (ICS) cybersecurity technology. It provides comprehensive visibility of your ICS/OT assets, threats and best-practice guidance on how to respond before a major compromise. Dragos Platform was designed by practitioners and is a security tool that ensures your team has the most current tools to fight industrial adversaries. It was developed by experts who are on the frontlines of fighting, combating, and responding to the most advanced ICS threats. The Dragos Platform analyses multiple data sources, including protocols, network traffic and data historians, host logs and asset characterizations. This gives you unparalleled visibility into your ICS/OT environment. The Dragos Platform quickly detects malicious behavior in your ICS/OT network and provides context to alerts. False positives are reduced for unrivalled threat detection.
  • 3
    ORDR Reviews
    ORDR is a cybersecurity platform built to proactively identify and mitigate risks by turning network intelligence into immediate, actionable outcomes. It provides comprehensive visibility into connected assets and environments, ensuring that security teams work with accurate and verified data. Through its AI-powered orchestration layer, ORDR aligns security, IT, and operational teams to prioritize and respond to threats efficiently. The platform integrates policy-based enforcement directly into network operations, enabling automated and consistent responses without relying solely on manual intervention. By combining intelligent automation with human oversight, it ensures decisions remain controlled and trustworthy. ORDR also eliminates fragmented workflows by connecting tools and processes into a unified system. This allows organizations to reduce response times and prevent incidents before they escalate. Its design supports complex industries like healthcare and manufacturing, where reliability and safety are critical. Overall, it empowers organizations to strengthen security posture while maintaining operational continuity.
  • 4
    Claroty Reviews
    Our platform, driven by Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, offers a comprehensive suite of industrial cybersecurity controls that integrate flawlessly with your current infrastructure, scale easily, and boast the lowest total cost of ownership (TCO) in the industry. These robust cybersecurity controls are built around the REVEAL, PROTECT, DETECT, CONNECT framework, ensuring you have the necessary tools to enhance your industrial cybersecurity, no matter your current stage in the journey. The Claroty Platform is utilized across various industries, each presenting its own specific operational and security challenges. Effective industrial cybersecurity begins with a clear understanding of what needs protection, and our platform eliminates the obstacles that hinder industrial networks from securely connecting to essential business operations, allowing for innovation while maintaining an acceptable risk threshold. By prioritizing security without sacrificing operational efficiency, our solution enables businesses to thrive in an increasingly complex digital landscape.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB