Claroty Unveils Innovative Visibility Orchestration for Enhanced Cybersecurity in CPS Environments
Claroty Unveils Innovative Visibility Orchestration for Enhanced Cybersecurity
On April 14, 2026, Claroty, a leading company in cyber-physical systems (CPS) protection, introduced its latest feature: Visibility Orchestration capabilities integrated into the Claroty xDome service. This new advancement aims to transform the often blurry concept of visibility into concrete, quantifiable measurements that underscore the importance of a robust CPS protection program. By enhancing organizations' understanding of their environments, this tool supports measurable advancements in both data quality and security protocols, leading to safer risk reduction strategies.
Addressing the Growing Threat of Visibility Blind Spots
In today's world, the risks associated with unknown and unmanaged assets are at an unprecedented level. Claroty's Team82 has documented over 200 cyber attacks in the last year, where intruders penetrated CPS areas simply by scanning for devices connected to the internet, often exploiting default credentials and unsecured protocols. Devices such as PLCs, HMIs, medical equipment, and IoT devices became gateways for attackers into crucial systems that control essential societal functions.
As highlighted by Gartner, awareness among organizations regarding their blind spots is increasing. Many asset-intensive organizations are starting to understand that CPS environments are central to their value generation. For instance, manufacturing firms generate revenue through production, while utility companies cannot fulfill their responsibilities without consistent service delivery. As a result, boards and executives are demanding greater transparency regarding the protection measures in place for their CPS environments.
Despite this heightened awareness, many organizations still fall short of fully grasping their visibility issues, mistakenly believing that having an asset inventory equates to comprehensive visibility. In reality, this level of visibility is often fragmented, inconsistent, and challenging to implement, creating a significant disconnect between visibility data and actionable security responses—ultimately risking the effective protection of business outcomes.
Converting High-Quality Data into Concrete Security Actions