Skip to Content

This browser is no longer supported.

For the best WWT.com experience, please use one of our supported browsers.

Safari Logo Safari Chrome Logo Chrome Firefox Logo Firefox Edge Logo Edge
Search wwt.com...
Top Page Results

See all search results

Featured Solutions
What's trending
Help Center
Home
Solutions & Services
Solutions
Automation & Orchestration
Cloud
Data Center
Digital
Digital Workspace
ESG
Mobility
Networking
Security Transformation
See all Solutions
See all Solutions
Services
Application Services
ATC Lab Services
Consulting Services
Customer Success
Infrastructure Services
Mergers & Acquisitions
Strategic Resourcing
Supply Chain & Integration
See all Services
See all Services
Industries
Utilities
Financial Services
Global Service Provider
Healthcare
Life Sciences
Manufacturing
Oil & Gas
Public Sector
Retail
See all Industries
See all Industries
Partners
Cisco
Dell Technologies
HPE
NetApp
VMware
f5
Intel
Microsoft
Palo Alto
See all Partners
See all Partners
Learning & Support
ATC
Communities
Events
Labs
Research
About
Footer Links
Careers
Contact Us
Diversity & Inclusion
Locations
News
Sustainability
  • Overview
  • Explore
  • Labs
  • Services
  • Partners
  • Select an Option

In the ATC

Level up your skills with on-demand learning labs that focus on the latest tech advancement.

Advanced Configuration Lab

OT Security

Cisco Cybervision Lab

Cisco Cybervision is monitoring a virtual chemical manufacturing process environment and a simulated substation on a flat network. The environment contains a virtual plant using the MODBUS communications protocol (1 HMI, 1 PLC, 6 I/Os), a virtual substation using the IEC 104 communications protocol (1 HMI, 4 RTUs) and an instance of Cisco Cybervision. This lab enables a user to familiarize and test Cisco Cybervision's ability to passively discover hosts, map networks, baseline traffic and issue alerts on a simulated OT environment.
Advanced Configuration Lab
5 launches

Foundation Lab

Endpoint Security

Binary Armor SCADA Network Guard

Binary Armor is setup to defend a simulated electrical substation using a NovaTech Orion LXm. In such a substation, the RTU would receive commands over the network and apply changes to reclosers (a physical device) in the substation which control the flow of power. This lab will show how Binary Armor can protect a substation from several attacks including insider threat.
Foundations Lab
40 launches

Advanced Configuration Lab

OT Security

Claroty Industrial Control System Security Demo

Claroty is monitoring a virtual chemical manufacturing process environment and a simulated substation on a flat network. The environment contains a virtual plant using the MODBUS communications protocol (1 HMI, 1 PLC, 6 I/Os), a virtual substation using the IEC 104 communications protocol (1 HMI, 4 RTUs), and an instance of Claroty. This lab enables a user to familiarize and test Claroty's ability to passively discover hosts, map networks, baseline traffic and issue alerts on a simulated OT environment.
Advanced Configuration Lab
10 launches

Guided Demo Lab

OT Security

Nozomi Guardian Industrial Control System Security Demo

Nozomi Guardian™ is monitoring a virtual chemical manufacturing process environment on a flat network. The environment contains a virtual plant (1 HMI, 1 PLC, 6 I/Os), a virtual substation (1 HMI, 4 RTUs), and an instance of Nozomi Guardian. This lab enables a user to familiarize and test Guardian's ability to passively discover hosts, map networks, baseline traffic and issue alerts on a simulated OT environment.
Guided Demonstration Lab
33 launches
Select an Option

What's new

Page Thumbnail
Optical Networking

Squeeze ROI Out of Legacy Technology With Converged IT/OT Solutions

WWT, Cisco and Schweitzer Engineering Laboratories recently demonstrated a converged transport solution aimed at helping utility organizations at the DistribuTECH International conference.
Article
• May 23, 2023

Advanced Configuration Lab

OT Security

Cisco Cybervision Lab

Cisco Cybervision is monitoring a virtual chemical manufacturing process environment and a simulated substation on a flat network. The environment contains a virtual plant using the MODBUS communications protocol (1 HMI, 1 PLC, 6 I/Os), a virtual substation using the IEC 104 communications protocol (1 HMI, 4 RTUs) and an instance of Cisco Cybervision. This lab enables a user to familiarize and test Cisco Cybervision's ability to passively discover hosts, map networks, baseline traffic and issue alerts on a simulated OT environment.
Advanced Configuration Lab
5 launches

Foundation Lab

Endpoint Security

Binary Armor SCADA Network Guard

Binary Armor is setup to defend a simulated electrical substation using a NovaTech Orion LXm. In such a substation, the RTU would receive commands over the network and apply changes to reclosers (a physical device) in the substation which control the flow of power. This lab will show how Binary Armor can protect a substation from several attacks including insider threat.
Foundations Lab
40 launches

Advanced Configuration Lab

OT Security

Claroty Industrial Control System Security Demo

Claroty is monitoring a virtual chemical manufacturing process environment and a simulated substation on a flat network. The environment contains a virtual plant using the MODBUS communications protocol (1 HMI, 1 PLC, 6 I/Os), a virtual substation using the IEC 104 communications protocol (1 HMI, 4 RTUs), and an instance of Claroty. This lab enables a user to familiarize and test Claroty's ability to passively discover hosts, map networks, baseline traffic and issue alerts on a simulated OT environment.
Advanced Configuration Lab
10 launches

Guided Demo Lab

OT Security

Nozomi Guardian Industrial Control System Security Demo

Nozomi Guardian™ is monitoring a virtual chemical manufacturing process environment on a flat network. The environment contains a virtual plant (1 HMI, 1 PLC, 6 I/Os), a virtual substation (1 HMI, 4 RTUs), and an instance of Nozomi Guardian. This lab enables a user to familiarize and test Guardian's ability to passively discover hosts, map networks, baseline traffic and issue alerts on a simulated OT environment.
Guided Demonstration Lab
33 launches
Page Thumbnail
Security Transformation

Security Priorities for 2023

A roadmap for securing the business and powering performance.
WWT Research
• Feb 7, 2023
Page Thumbnail
Security Transformation

5 Cybersecurity Tips to Keep Your Business Protected

As technology and IT environments become more complex along with the evolving threat landscape, many organizations have been looking deeper into their cybersecurity defense strategies.
Article
• Sep 26, 2022
Page Thumbnail

OT Security with Enrique Martinez of WWT

Enrique Martinez of WWT discusses OT Security on Episode 117 of The Automation Podcast
News
• Sep 6, 2022
Page Thumbnail
OT Security

How to Protect Your OT Network — Without Disrupting Operations

As digital transformation initiatives drive IT and OT networks toward convergence, the result is a network where anything can theoretically connect to anything else. That's a dangerous amount of risk in a world where 93% of OT companies have experienced an intrusion in the past year — with 78% reporting more than three.
Article
• Aug 24, 2022
Page Thumbnail
OT Security

Defense-in-depth: a proven strategy to protect industrial assets

"The first step to any effective OT-security program is building alignment between executives, business leaders, IT and operations."
News
• Aug 18, 2022
Page Thumbnail
Network Security

Modern, Secure Network Infrastructure Supports a Joint Venture with Global Pharmaceutical

WWT helps the company migrate to a new, secure infrastructure, unlocking significant shareholder value.
Case Study
• Jun 2, 2022
Page Thumbnail
Network Security

Global Pharmaceutical Company Modernizes Critical Infrastructure

Learn how a large pharmaceutical manufacturer partnered with WWT to develop and execute a global IT-OT infrastructure modernization program that reduces operational risk while improving operational visibility.
Case Study
• Mar 17, 2022
Page Thumbnail
Wi-Fi Networking

Electric Carmaker Taps Into Real-Time Data With Resilient, Secure Industrial Network

The company partnered with WWT to design and implement a resilient and flexible network for a new production facility.
Case Study
• Feb 15, 2022
Page Thumbnail
Zero Trust

Manufacturer Establishes Micro-segmentation Strategy to Address Risks of Flat Network

WWT Security Advisory Services works with manufacturer to assess 2,500 applications and pilot a solution.
Case Study
• Dec 7, 2021
Page Thumbnail
Security Strategy

Pharmaceutical Manufacturer Accelerates OT Security

WWT brings visibility to assets, traffic flows, and interdependencies of critical systems and processes within manufacturing plants.
Case Study
• Jul 28, 2021
Page Thumbnail
Security Strategy

Keys to Securing Distributed Energy Resource Management Systems (DERMS)

DERMS are critical for managing Distributed Energy Resources, but they present very real cybersecurity challenges.
Article
• Jul 12, 2021
Page Thumbnail
Security Strategy

Virtual CISOs Mature Cybersecurity Programs Across Industries

Clients from healthcare, manufacturing and financial services see the benefits of working with WWT's Virtual CISO consultants.
Case Study
• Jun 29, 2021
Page Thumbnail
Security Strategy

Manufacturer Uses Risk Assessment to Protect IT and OT Assets

A global manufacturing company faced with implementing a security plan enlisted WWT to be their trusted advisor, conduct a risk assessment and help navigate the OEM landscape.
Case Study
• Sep 5, 2019

OT Security

As industrial control systems (ICS) converge with enterprise networks and traditional IT environments, operational technology (OT) security helps ensure the safety and integrity of industrial operations.

What's related

Security Transformation Manufacturing Security Operations ATC Consulting Services Security Strategy
© World Wide Technology. All Rights Reserved
  • About
  • Careers
  • Locations
  • News
  • Press Kit
  • Contact Us
  • Privacy Policy
  • Acceptable Use Policy
  • Quality
  • Information Security
  • Supplier Management
  • Cookies