Loading
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

InformationInformation
This content is not available in your selected language.
Rockwell Automation logo
Products
Hardware
What's New in Hardware
Circuit & Load Protection Condition Monitoring Connection Devices Distributed Control Systems Drives Energy Monitoring Human Machine Interface (HMI) Independent Cart Technology Industrial Computers & Monitors Industrial Control Products Input/Output Modules Lighting Control
Motion Control Motor Control Network Security & Infrastructure Packaged Solutions Power Supplies Programmable Controllers Push Buttons & Signaling Devices Relays & Timers Safety Instrumented Systems Safety Products Sensors & Switches Signal Interface
Software
What's New in Software
Cloud Software
 
Design
Studio 5000 FactoryTalk Logix Echo Emulate3D Digital Twin Arena Simulation FactoryTalk Design Studio FactoryTalk Twin Studio FactoryTalk Vault
 
Analytics & Data
FactoryTalk Historian FactoryTalk Analytics FactoryTalk Analytics LogixAI FactoryTalk DataMosaix FactoryTalk Energy Manager Thingworx IIoT FactoryTalk Transaction Manager FactoryTalk Edge Manager Model Predictive Control
HMI
FactoryTalk View FactoryTalk Optix
 
MES
Plex MES FactoryTalk ProductionCentre FactoryTalk PharmaSuite Plex MES for Food & Beverage FactoryTalk CPGSuite Plex Quality Management System Plex Enterprise Resource Planning Plex Asset Performance Management Plex Production Monitoring Finite Scheduler FactoryTalk EIHub
 
Performance Monitoring
FactoryTalk Metrics OEE
 
Thin Client Management
ThinManager
Maintenance
Fiix CMMS FactoryTalk Analytics GuardianAI FactoryTalk AssetCentre FactoryTalk Remote Access FactoryTalk Network Manager Emonitor
 
Process
PlantPAx FactoryTalk Batch
 
Industrial Communications
FactoryTalk Linx
 
XR/Augmented Reality
Vuforia
Product Directory Allen‑Bradley FactoryTalk
Services
Asset Optimization & Workforce Services
Asset Optimization Services Overview Equipment Repair Equipment Remanufacturing Repair and Inventory Agreements Integrated Service Agreements Remote Support & Monitoring Onsite & Field Services Safety Services Training Services
Cybersecurity & Network Infrastructure
Cybersecurity Industrial Network Infrastructure Pre-Engineered Network Solutions
Digital Thread
Overview
Production Automation
Overview Coordinated Drive System Solutions
LifecycleIQ Services
LifecycleIQ Services
LifecycleIQ Services
Lifecycle Services help your manufacturing facility work faster, smarter and with greater agility at every lifecycle stage.
Get Started
LifecycleIQ Services
Solutions & Industries
Solutions
Advanced Motion & Robotics Asset Management Cybersecurity Data Operations & Analytics Digital Thread Digital Transformation Industrial Automation Control Industrial Components Networks & Infrastructure On-Machine Solutions
Packaged Solutions Process Solutions Production Automation Production Operations Management Safety Solutions  Scalable Control & Visualization Smart Manufacturing Sustainable Solutions Workforce Enablement
 
Solutions for
EPC OEMs
Industries
Aerospace Automotive & Tire Cement Chemical Entertainment Fiber & Textiles Food & Beverage Household & Personal Care Hydrogen Infrastructure Life Sciences
Marine Metals Mining Oil & Gas Power Generation Print & Publishing Pulp & Paper Semiconductor Warehouse & Fulfillment Water Wastewater
Hawaiian Host Group Overcomes Multiple Packaging Challenges
Hawaiian Host Group Overcomes Multiple Packaging Challenges
Case Study
Case Study
Hawaiian Host Group Overcomes Multiple Packaging Challenges
Automation solution helps Cama Group machine carefully and precisely package delicate confectionary at scale and at speed – no matter the packaging format.
Read Now
View Case Studies
Support
Documentation
Technical Documentation Center Product Drawings & Wiring Diagrams Product Certifications Release Notes Technical Specifications
Product Support
Downloads Selection & Configuration Management
Training
Webinars Workforce Development Training Instructor-led Courses Certificate Programs Job Aids Training Workstations Learning+ Training Subscriptions
Contact Us
TechConnect Support Customer Care Software Portal Help General Inquiries
TechConnect Support
TechConnect Support

Get the knowledge and assistance for solving your technical challenges.

Learn More about TechConnect
Compatibility and Downloads (PCDC) Knowledgebase Literature Library Engage Online Community
Sales & Partners
Find a Partner
Go to the Partner Finder
 
Our PartnerNetwork
PartnerNetwork Program Digital Partners Distributor Partners EPC Partners Licensed Developers
Original Equipment Manufacturer (OEM) Partners Strategic Alliance Partners System Integrator Partners Technology Partners
Order Online
Software Subscriptions E-learning Training Instructor-led Training Learning+ Training Subscriptions
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Resources
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

Select country or region
  • United States
  • Argentina
  • Australia
  • Belgique | Belgium
  • Brasil
  • Canada
  • Colombia
  • Czech Republic
  • Denmark
  • Deutschland
  • España
  • Finland
  • France
  • Hungary
  • India
  • Indonesia
  • Ireland
  • Israel
  • Italia
  • México
  • Netherlands
  • New Zealand
  • Norway
  • Poland
  • Portugal
  • Puerto Rico
  • Romania
  • Russia
  • Schweiz | Suisse
  • Singapore
  • South Africa
  • Sweden
  • Turkey
  • Ukraine
  • United Arab Emirates
  • United Kingdom
  • Österreich
  • 中国
  • 台灣, 中國
  • 日本
  • 한국
Select language
  • English
  • Deutsch
  • Español
  • Français
  • Italiano
  • Português
  • 日本語
  • 简体中文
  • 繁體中文
  • 한국어
Sign In Create an Account
Why Create an Account?
Create bills of materials, submit repair quotes, register products and more!

Manage your e-communication subscription preferences.

Manage your user profile.
Welcome, {0}
Residing Location
My Account Sign Out
Your recent searches
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
All
Products
Documents
Downloads
Suggested search terms
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
Results for "{0}"
View all results
Product results for "{0}"
Product Image
Product Image
Product Image
View all product results
Document results for "{0}"
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
View all document results
Download results for "{0}"
DownloadDownload
Catalog Numbers:
DownloadDownload
Catalog Numbers:
DownloadDownload
Catalog Numbers:
View all download results
Blog | Cybersecurity
Recent ActivityRecent Activity
2 minute read

Focus on Cybersecurity Threats that Really Matter

Push through the noise and turn your attention to the threats that matter.

Share This:

LinkedInLinkedIn
XX
FacebookFacebook
PrintPrint
EmailEmail
A woman explains cybersecurity details to an engineer within a manufacturing facility.

Focus on the Cybersecurity Threats that Matter

With greater connectivity comes greater risk for security threats. These threats can take many forms, from bad actor hackers to well-intentioned mistakes. Cybersecurity

events can impact network availability, interrupt operations and halt productivity.

Even with a robust security program in place, protecting your industrial networks against cyber threats requires constant vigilance. Threat detection services can help you monitor and detect these increasingly complex threats.

Threat detection software identifies events that do not conform to an expected pattern or baseline within Industrial Control System (ICS) networks – any activity that may pose a risk to the availability of your system even before it happens. It can also help in determining internal threats or inspecting traffic without disrupting normal production.

Threat Detection and Fine Tuning

A potential challenge of threat detection software is the proliferation of alarms: Too many system alarms are just as harmful as too few. Without the ability to fine-tune your threat detection, you can quickly become overwhelmed with noise – and potentially let bad actors infiltrate your system.

Threat tuning – also called system tuning – optimizes the configuration of the continuous threat detection (CTD) software to help eliminate false positives and prioritize actionable alerts. Threat tuning helps prevent alert fatigue – a dangerous condition that arises when thousands of alerts flood the screen with non-actionable items. The concept is not new – what is novel is how threat tuning is expanding beyond information technology (IT) systems for adoption in operations technology (OT) through a service that allows operators to fine-tune the system themselves.

Saving Time and Effort

Without threat tuning, a system could generate thousands of alerts per shift with fewer than .01% connected to an action, equating to hundreds of hours a year chasing down unnecessary alarms.

“With the right threat tuning software, you can eliminate the 99.9% of alerts that don’t matter so your operators can concentrate only on the messages of value,” said Quade Nettles, Cybersecurity Services Product Manager, Rockwell Automation.

Such clarity in threat detection and the improved response rate improves an organization’s security posture and positions the cybersecurity team for greater long-term continuous threat detect success.

Rockwell Automation and Claroty have partnered to offer comprehensive OT security solutions. The Rockwell Automation Twinsburg, Ohio, manufacturing facility was a proving ground for Claroty’s threat tuning capabilities.

The pilot included IT and OT functions that could experience more than 10,000 alarms daily.

“These results help to quantify the value of threat tuning in the overall CTD investment and specifically, protect ROI,” said Gary Kneeland, Technical Director, Claroty. “While it’s enticing to jump into real-time monitoring, it’s important to include managed services like threat tuning to experience the full range of benefits.”

With the convergence of IT and OT, it’s important to identify cybersecurity risks to industrial assets. And, it’s more important than ever to work with industrial security

software providers like Claroty, and managed services providers like Rockwell Automation – companies that fully understand operational functions within industrial protocols and work to help secure and manage industrial control networks.

Published May 21, 2021

Rockwell Automation and Claroty: Comprehensive OT Cybersecurity
Two employees, a male and a female wearing yellow safety jackets and white hard hat looking at information on a monitor in a factory.
Overview
Rockwell Automation and Claroty: Comprehensive OT Cybersecurity

Rockwell Automation and Claroty have partnered to offer comprehensive OT security solutions tailored to meet your toughest challenges.

Watch Now
Topics: Cybersecurity

Carol Jors
Carol Jors
Storyteller, Rockwell Automation
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Company Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right
Company
About Us Accessibility Careers Diversity, Ethics and Integrity Engage Online Community Investor Relations Modern Slavery Statement Sustainability Trust Center
 
News & Events
Newsroom Press Releases Automation Fair Upcoming Events
 
Trending Topics
Cybersecurity Digital Transformation Smart Manufacturing The Connected Enterprise®
 
Training
Webinars Workforce Development Training
 
PartnerNetwork
Find a Partner What is the PartnerNetwork?
 
Our Brands
Allen‑Bradley FactoryTalk LifecycleIQ Services
Contact Us
TechConnect Support Customer Care General Inquiries How to Buy Report Ethical Concerns
Insights
Results Achieved Case Studies Blogs The Journal Podcasts
BlogRockwell Automation's Blog
US | EN
Legal Notices
Privacy & Cookies Policy
Email Preferences
Cookie Settings
Accessibility Settings
© 2025 Rockwell Automation
Rockwell Automation Home
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose