Loading...
OT asset discovery tools for identifying and inventorying industrial control systems, IoT devices, and operational technology assets.
Browse 6 operational technology asset discovery tools
Active polling add-on for OT/IoT asset discovery and configuration data
Active polling add-on for OT/IoT asset discovery and configuration data
Active OT network scanner for industrial asset discovery and inventory
Active OT network scanner for industrial asset discovery and inventory
A tool for scanning networks, enumerating Siemens PLCs, and gathering detailed information about them.
A tool for scanning networks, enumerating Siemens PLCs, and gathering detailed information about them.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool powered by Shodan.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool powered by Shodan.
Passively maps and visually displays ICS/SCADA network topology for network security
Passively maps and visually displays ICS/SCADA network topology for network security
A Digital Bond research project to enumerate ICS applications and devices
A Digital Bond research project to enumerate ICS applications and devices
Common questions about Operational Technology Asset Discovery tools including selection guides, pricing, and comparisons.
OT asset discovery tools for identifying and inventorying industrial control systems, IoT devices, and operational technology assets.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Get strategic cybersecurity insights in your inbox