Fujitsu infinity graphic

Quick self-assessment OT security

Assess your cyber maturity in your production environment

OT cyber security is a cornerstone of the successful sustainable transformation of manufacturing, utilities, or any industry with digitised physical processes at the heart of their value creation. Many such environments were designed without cyber in mind. It is a journey to bring them up to the cyber level required to support operations with acceptable risk and to be compliant with relevant regulations.

This quick self-assessment consists of some basic questions about OT security. Move the dot to select your response on a scale of 1 to 5 that is most applicable to your situation (1=Strongly disagree, 5=Strongly agree). Press “Assess your maturity,” and you will receive a first indication of how far you are on your OT security journey and some next steps suggestions. It is free of charge and takes only a few minutes.

Fujitsu invites you to try it out and, if you wish, to continue the dialogue with us.

1
Strongly disagree

5
Strongly agree

1
Strongly disagree

5
Strongly agree

1
Strongly disagree

5
Strongly agree

1
Strongly disagree

5
Strongly agree

1
Strongly disagree

5
Strongly agree

1
Strongly disagree

5
Strongly agree

Your result
Phase 1:
Orientation
icon of a person's side profile with lines denoting technology

Organisations in the Orientation Phase have limited implementation of OT security but are aware of the need for change.

Please explore our materials and then talk to us about next steps. You may choose to conduct an OT cyber security assessment with Fujitsu. In a collaborative process, we reveal your risk profile, identify your OT assets, and make recommendations for the next phase of your transformation.

Your result
Phase 2:
Address critical gaps
icon of a shield with network lines

In this phase, organisations focus on immediate priority actions to address major security gaps and risks. It is important to concentrate on controls that bring short-term exposure reduction, such as securing exposed legacy equipment or addressing perimeter security.

Fujitsu offers consulting and professional services to support you in this phase. Continuous Fujitsu services, such as Managed Firewall, provide an attractive alternative to setting up your own operational teams for all ongoing tasks.

Your result
Phase 3:
Transformation
icon of the head and shoulders of a person surrounded by six connected circles

Organisations in this phase systematically improve OT security across people, processes, and technology.

The OT consultants of Fujitsu support the design and implementation of OT sub-segmentation, secure remote access, identity management, process and policy design, and OT cyber security training.

The OT Asset Discovery Service of Fujitsu provides data for a CMDB, including ServiceNow's OT Management, enabling many operational improvements.

Your result
Phase 4:
Continuous process
icon of two arrows forming a continuous circle

This phase establishes continuous processes for OT cyber security. Organisations can detect and respond to anomalous behaviour in the OT landscape. Integrated IT and OT security covers the entire attack surface and is aligned with overarching major incident processes.

Fujitsu provides a 24/7/365 service for OT Managed Monitoring, which relieves you of the need to run this capability yourself. It inputs to your Incident Response process and can be integrated with an existing IT monitoring capability.

icon of a person's side profile with lines denoting technology

Organisations in the Awareness Phase have limited implementation of OT security but are aware of the need for change.

Please explore our materials and then talk to us about next steps. You may choose to conduct an OT Cybersecurity Assessment with Fujitsu. In a collaborative process, we reveal your risk profile, identify your OT assets, and make recommendations for the next phase of your transformation.

icon of a shield with network lines

In this phase, organisations focus on immediate priority actions to address major security gaps and risks. In this phase it is important to concentrate on controls that bring short-term exposure reduction, such as securing exposed legacy equipment or addressing perimeter security.

Fujitsu offers consulting and professional services to support you in this phase.

Continuous Fujitsu services, such as Managed Firewall, provide an attractive alternative to setting up your own operational teams for all ongoing tasks.

icon of the head and shoulders of a person surrounded by six connected circles

Organisations in this phase systematically improve OT security across people, processes, and technology. This can be conducted together with phase 4.

The OT consultants of Fujitsu and professional service experts support the design and implementation of OT sub-segmentation, secure remote access, identity management, process and policy design, and OT cyber security training.

The OT Asset Discovery Service of Fujitsu provides data for a CMDB, including ServiceNow's OT Management, enabling many operational improvements.

icon of two arrows forming a continuous circle

This phase establishes continuous processes for OT cybersecurity. Organisations can detect and respond to anomalous behaviour in the OT landscape. Integrated IT and OT security covers the entire attack surface and is aligned with overarching major incident processes.

Fujitsu provides a 24/7/365 service for OT Managed Monitoring, which relieves you of the need to run this capability yourself. It inputs to your Incident Response process and can be integrated with an existing IT monitoring capability.

If you would like to know more and engage with one of our experts, please fill out your information and we will be in touch with you within 48 hours.

To comply with the new GDPR regulations and ensure you continue to receive relevant communications from Fujitsu on our offerings and future events, we are updating our communication preferences.

To receive future relevant communications from Fujitsu please opt‑in.

John Swanson
John Swanson

Security Offerings Lead
Uvance Hybrid IT Security

linkedin icon
Jamie Wilkie
Jamie Wilkie

Product Owner OT Security Services

linkedin icon
Ali Najam
Ali Najam

Global Lead OT Cyber Security Consultant and Architect

email icon