Browse Definitions :
information technology (IT) technological convergence

operational technology (OT)

What is operational technology?

Operational technology (OT) is a category of hardware and software that monitors and controls how physical devices perform.

In the past, OT was used primarily in industrial control systems for manufacturing, transportation and utilities. Unlike IT, the technology that controlled operations in those industries wasn't networked. Many of the tools for monitoring or adjusting physical devices were mechanical, and those that had digital controls used closed, proprietary communication protocols.

However, as physical devices are becoming smart, there is an increasing trend toward IT/OT convergence. Wireless connectivity has provided administrators in charge of OT with better monitoring systems and the ability to control physical devices remotely. Advances in machine-to-machine communication and machine learning have created a notable change, enabling the data that physical devices produce to be analyzed in real time to facilitate autonomy, preventive maintenance and improved uptime.

Internet-capable technology has moved into industrial control systems (ICS) and supervisory control and data acquisitions (SCADA) networks. However, operations technology faces the same malware, identity management and access control security challenges that IT faces. The difference is that vulnerabilities in an OT system can leave critical infrastructure at risk of sabotage that can result in life-or-death situations.

Why is operational technology important?

OT is critical for businesses and society at large. At the organizational level, OT is usually tied to core business processes. In a factory, OT is often the tool that makes manufacturing goods possible. Likewise, hospitals depend on OT devices to diagnose patients. For a business or other organization that relies on OT, downtime caused by service outages can severely impair or even halt the organization's core business activities.

On a broader level, society depends on OT to keep critical infrastructure functioning. For example, in May 2021, a ransomware attack caused the Colonial Pipeline to be shut down. The pipeline, which itself is considered an OT, transports 2.5 million barrels of fuel each day. The shutdown resulted in a major East Coast fuel shortage. This is just one example of how critical some operational technologies can be.

Examples of OT environments

Many industries rely on critical OT infrastructure. Some OT environments include the following:

  • Factories. OT controls the machinery used in manufacturing environments to power assembly lines and other processes.
  • Power plants. OT systems monitor both the performance and resource use of equipment used in power plants.
  • Oil and gas refineries and pipelines. The oil and gas industry requires critical OT infrastructure for upstream, midstream and downstream operations. OT monitors rigs, pumps and other extraction methods within upstream operations. It also performs remote asset management when oil and gas is transported, refined and stored during operations.
  • Transportation and aviation facilities. Supply chain management, commuter transport and aviation all rely on OT to keep transport operations running smoothly.
  • Water treatment facilities. OT controls processes involved with wastewater treatment.

Examples of OT systems

It's easy to think of operational technology systems as closely associated with industrial equipment and, indeed, they are heavily used on factory floors and power plants. However, they aren't limited to industrial processes. An OT system can be any special purpose, computerized equipment. For example, ATMs, safety systems and traffic lights are all such systems that aren't part of traditional IT infrastructure and are considered OT systems.

Other examples of OT systems include the following:

  • Robots. Industrial robotics, such as cobots, are considered OT systems, as are robots that are increasingly used in retail for stocking shelves or mopping floors.
  • Medical devices. Certain medical devices, such as magnetic resonance imaging machines and other types of radiology equipment, are considered OT devices.
  • Distributed control systems. A DCS is used to control the automation of industrial operations. Controller devices are spread across a factory or plant floor to manage each process individually.
  • Human-machine interfaces. HMIs help operators monitor OT environments visually with visual displays of data, a control panel for interaction and typically a notification setup for important alerts.
  • ICS. These systems manage and monitor OT networks, including the infrastructure and processes they encompass. They use network-connected hardware and software components.
  • Industrial internet of things. IIoT systems connect physical devices and objects to IT networks, letting them collect data and perform predictive maintenance on them. IIoT is a subset of internet of things. IoT and industrial IoT are both relevant to OT environments, but IIoT is specific to industrial environments.
  • Programmable logic controllers. A PLC automates various industrial processes and can function in harsh environments, such as extreme heat, cold or vibration.
  • Remote terminal units. RTUs are used for data collection and management in OT environments.
  • SCADA. These systems capture real-time data from OT, through both software and hardware components, for the purpose of monitoring performance.
  • Smart buildings. These facilities are enterprise, commercial and residential buildings equipped with automated IoT technology for various reasons, such as operating efficiency, safety and security.
  • Smart transportation. IT networks are used to monitor the performance of various modes of transportation. Connected devices on vehicles can provide data traffic, weather conditions and other factors to create more efficient routes and improve vehicle efficiency.
Examples of IT vendors acquiring operational technology companies.
Many traditional IT vendors are acquiring operational technology-focused companies to remain competitive.

Operational technology challenges

As organizations work to converge IT and OT systems, they must be aware of the inherent challenges of doing so. Many of these challenges stem from the nature of the OT systems being used. They include these four.

Legacy issues

Although some OT systems are modern and complex, it's also common -- particularly in industrial settings -- for OT equipment to be several decades old. When you consider such a device's age and its proprietary design, it can be difficult and costly to connect the device to modern IT systems.

Cybersecurity risks

Another challenge associated with these combinations is that they can introduce OT cybersecurity risks. This is especially true for legacy OT systems. Such systems were likely never intended to be connected to an organization's IT systems. In most cases, they were intended to operate in an isolated environment and didn't need protection against cyberthreats.

Instead, the design process likely focused on making the device as reliable as possible, rather than addressing security threats. Connecting such systems to traditional IT infrastructure can make them vulnerable to cyberattacks, because hackers have a direct communications path through which to access the device. Organizations looking to converge their IT/OT infrastructure must put OT security measures at the forefront.

Knowledge gaps

Another challenge is addressing any knowledge gaps. OT engineers are unlikely to be experts in IT. Similarly, few IT pros have a strong working knowledge of OT systems.

Update and patch management

Finally, OT devices might not fit neatly into an organization's normal IT protocols for software updates and patch management. For example, patch management is often regarded as a critical IT task. However, patches for OT devices might be released on an infrequent basis or not at all.

Even if an OT device manufacturer releases a patch, there will likely be some pushback over installing the patch. At best, installing the patch will cause a service interruption while the device is taken offline and rebooted, which affects the organization's revenue. At worst, the patch can introduce problems into a device that was previously reliable, again, adversely affecting the organization's bottom line.

OT vs. IT: What are the differences?

IT environments have traditionally focused on compute, networking and storage resources. These resources include servers, storage arrays and network switches in the data center or the cloud as well as desktop computers, smart phones and supporting hardware. Enterprise IT is also responsible for managing software at the infrastructure and application levels. This means deploying and maintaining operating systems, IT security controls and monitoring tools, and the applications users rely on to do their jobs.

Conversely, OT encompasses the machines associated with physical processes. These processes can be anything from the manufacturing of goods to medical imaging. Like IT, they revolve around the use of digital systems. However, these systems tend to be proprietary and don't generally fall into the scope of traditional IT assets.

IT/OT convergence

IT/OT convergence involves linking operational technologies to traditional IT systems. Bringing these systems together can make it easier for an organization to meet its compliance mandates, while also breaking down data silos. However, there can also be other, more compelling benefits.

Steps to integrate IT and OT.
To integrate IT and OT, management must update existing processes and cross-train employees.

Linking IT systems to OT devices brings intelligence to various business processes. In a factory setting, a converged IT/OT system can analyze the entire manufacturing process to spot inefficiencies. Detecting and eliminating these inefficiencies, ultimately, makes the business more profitable.

Likewise, IT systems can monitor OT equipment use to see when the devices will need maintenance based on their use. This prevents machines from breaking down and saves the business money.

The role of edge computing in IT/OT convergence

Edge computing involves deploying computing devices much closer to sources of data to reduce challenges associated with distributed systems where computing capabilities are further away from the data sources. Edge computing complements OT systems in multiple ways, such as the following:

  • Real-time analytics. Edge computing reaches data sources in remote locations and analyzes it from those locations so not as many IT and OT resources are expended.
  • Security. Edge computing systems sit in between OT devices and IT networks, using intrusion detection capabilities to identify cyberattacks. They also can reduce the amount of data transmitted between OT and IT devices and networks so that only essential data is sent and secured. This reduces unnecessary opportunities for data breaches and other security incidents.
  • Decentralization. Edge computing often moves IT and OT resources to the cloud so there's less reliance on centralized physical infrastructure that can be prone to problems. This results in more reliable systems as well.
  • Reduced latency. Data is processed and analyzed closer to the source, reducing the time and resources IT must devote to doing so.
  • Lower bandwidth. By minimizing the amount of data that's transferred to only essential data, edge computing reduces the amount of bandwidth that would otherwise be required to transmit large data volumes.

Businesses that rely heavily on OT networks and infrastructure should be aware of five potential OT threats and security challenges and know how to respond when they arise. Learn what these challenges are to be proactive in securing OT.

This was last updated in May 2024

Continue Reading About operational technology (OT)

  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • intrusion detection system (IDS)

    An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • What is lead-to-revenue management (L2RM)?

    Lead-to-revenue management (L2RM) is a set of sales and marketing methods focusing on generating revenue throughout the customer ...

  • What is relationship marketing?

    Relationship marketing is a facet of customer relationship management (CRM) that focuses on customer loyalty and long-term ...

  • contact center burnout

    Contact center burnout refers to physical, emotional and mental exhaustion experienced by contact center employees.