Tel Aviv, Israel – May 2, 2023 – OTORIO, the leading provider of operational technology (OT) cyber and digital risk management solutions, today announced that it has secured a patent from the U.S. Patent and Trademark Office (USPTO) for the company’s risk management model and attack graph analysis algorithm. This marks a significant milestone for OTORIO's proprietary technology and further validates the company as a pioneer in the OT security market.
The USPTO issued U.S. Patent No. 11637853, "Operational Network Risk Mitigation System and Method," for OTORIO's algorithm simulation model, which underpins its end-to-end OT cybersecurity platform. The company’s unique technology calculates OT cybersecurity threats by analyzing and visualizing four key components -- threat, likelihood, vulnerability, and impact -- and provides risk mitigation actions prioritized according to actual exposure and potential impact on operations. This enables organizations to take proactive measures to safeguard their critical assets and processes.
OTORIO’s attack vector graphs offer a dynamic visual representation of network topology for easy navigation between assets, vulnerabilities, their connections, and the security controls' influence. This provides crucial context to OT cybersecurity posture, along with concise calls to action, enabling organizations to prioritize and address risk effectively.
"This patent recognizes our innovative approach to quantifying OT cyber risk and positions us as market leaders," said Yair Attar, co-founder & CTO, OTORIO. "We are pleased to share this milestone with our valued customers and partners as we continue to address the most pressing regulatory and cybersecurity challenges of today."
OTORIO's monitoring capabilities empower organizations to proactively manage vulnerabilities and harden security by evaluating the likelihood of incidents across all assets, threats, and potential scenarios. Any variations in the security posture serve as a clear signal for proactive measures, enabling organizations to stay ahead of emerging threats and safeguard their operational technology.
The company’s proprietary algorithm incorporates industry-standard metrics and adheres to the NIST CVSS system for vulnerability scoring, ensuring compliance with industry standards and avoiding the need for re-scoring of common risks.