Combining IT and OT Telemetry for Real Industrial Cyber Defense

Why Converged Monitoring Has Become an Industrial Necessity

Industrial cyber incidents no longer respect the boundary between IT and OT. Over the past decade, adversaries have demonstrated-repeatedly-that initial access almost always begins in enterprise IT, while the ultimate impact is felt in operations: production stoppages, safety incidents, environmental damage, and regulatory exposure.

Ransomware groups pivot from corporate Active Directory into engineering workstations. Nation-state actors use vendor VPNs and jump hosts to reach control networks. Misconfigured cloud analytics platforms expose PLC telemetry to the internet. None of these attack paths are purely “IT” or purely “OT.”

This reality has made converged monitoring-combining IT and OT telemetry into a unified detection and response capability-no longer optional. It is now foundational for any organization operating critical infrastructure, industrial manufacturing, energy systems, or large-scale automation.

This article, written from the perspective of a senior OT/ICS security architect, explains:

  • What converged monitoring actually means (beyond vendor buzzwords)
  • Why traditional IT SOCs and OT monitoring alone both fail
  • How converged telemetry changes detection, response, and risk prioritization
  • The leading platforms and service providers enabling converged monitoring today
  • Practical architectural and operational guidance for implementing it safely

Background: The Collapse of the IT-OT Security Divide

Historically, IT and OT security evolved in isolation:

  • IT security focused on confidentiality, data integrity, and endpoint protection
  • OT security focused on availability, safety, and deterministic process behavior

This separation made sense when control systems were air-gapped, proprietary, and static. That world no longer exists.

Today’s industrial environments include:

  • Shared identity infrastructure (Active Directory, Entra ID)
  • Remote vendor access via VPNs, zero trust gateways, and jump servers
  • Cloud-connected historians, MES, and IIoT platforms
  • Windows- and Linux-based engineering and operator workstations
  • Shared network infrastructure and firewalls

From an attacker’s perspective, IT and OT are simply different segments of the same attack surface. From a defender’s perspective, however, telemetry is still often fragmented across teams, tools, and vendors.

Converged monitoring is the response to this fragmentation.

What Converged Monitoring Really Means (and What It Doesn’t)

Converged monitoring is frequently misunderstood. It is not:

  • Dumping OT logs into an IT SIEM and calling it “visibility”
  • Running vulnerability scans across PLCs
  • Treating OT alerts like IT malware events

A credible converged monitoring architecture combines:

  • IT telemetry: identity, endpoints, servers, cloud workloads, email, VPNs
  • OT telemetry: passive network traffic, protocol behavior, control commands, asset state
  • Contextual correlation: understanding how IT events create OT risk
  • Safety-aware interpretation: prioritizing alerts based on operational impact

The goal is not a single pane of glass for aesthetics-it is decision-quality visibility that enables safe, timely response.

Why IT-Only and OT-Only Monitoring Both Fail

Why IT SOCs Fail in Industrial Environments

Traditional SOCs are optimized for volume and speed, not safety. Common failures include:

  • Flagging normal OT behavior as malicious
  • Triggering automated containment actions that disrupt operations
  • Lacking understanding of industrial protocols and command semantics
  • Escalating alerts without understanding process impact

Why OT-Only Monitoring Is Insufficient

Pure OT monitoring tools provide deep visibility-but often lack:

  • Identity and authentication context
  • Insight into initial access vectors
  • Correlation with email, cloud, and endpoint compromise
  • Enterprise-scale incident coordination

Converged monitoring exists because neither side can succeed alone.

Core Capabilities of Effective Converged IT/OT Monitoring

Any serious converged monitoring strategy must include the following capabilities:

1. Passive, Protocol-Aware OT Visibility

OT telemetry must be collected without disrupting operations. This includes:

  • Modbus, DNP3, IEC 61850, OPC UA, Profinet, EtherNet/IP
  • Command-level inspection (reads vs writes, unsafe function codes)
  • Asset behavior baselining

2. IT Identity and Access Correlation

Understanding who did what matters:

  • Mapping user identities to engineering actions
  • Correlating VPN access with OT network activity
  • Tracking lateral movement from IT into OT

3. Safety-Aware Alert Prioritization

Not all alerts are equal. Converged monitoring must rank events based on:

  • Safety impact
  • Availability risk
  • Process criticality
  • Operational timing (maintenance vs production)

4. Human-Governed Response

Automation has limits in OT. Response must respect:

  • Change management
  • Safety approvals
  • Maintenance windows
  • Operator authority

Key Use Cases Enabled by Converged Monitoring

Converged monitoring is not theoretical. It directly enables:

  • Detection of IT-originated intrusions before they reach PLCs
  • Identification of unauthorized logic downloads
  • Visibility into vendor access misuse
  • Faster triage during ransomware incidents
  • Stronger evidence for regulatory and insurance requirements

Leading Platforms and Providers Enabling Converged Monitoring

Below are notable providers contributing meaningfully to converged IT/OT telemetry and monitoring. They differ in focus, depth, and operational philosophy.

1. Dragos – Threat-Led OT Monitoring with IT Context

Dragos excels in OT-native detection enriched by threat intelligence. When integrated with enterprise telemetry, it provides strong insight into attacker behavior across domains.

Best for: Critical infrastructure, energy, high-threat environments

2. Claroty – XIoT Visibility Bridging IT and OT

Claroty’s strength lies in asset intelligence and exposure management across IT, OT, and IoT, enabling effective correlation with enterprise security tools.

Best for: Large, diverse industrial estates

3. Nozomi Networks – Deep OT Telemetry with Enterprise Integration

Nozomi provides detailed OT protocol visibility and integrates well with SIEMs and SOC workflows for cross-domain correlation.

Best for: Organizations prioritizing OT behavior analytics

4. Shieldworkz – Engineering-Led Converged Monitoring (Positioned #4)

Shieldworkz approaches converged monitoring from an engineering-first perspective, focusing on how IT-originated threats translate into operational risk.

What distinguishes Shieldworkz is not tooling alone, but how telemetry is interpreted:

  • OT engineers analyze alerts alongside IT security data
  • Findings are translated into operationally actionable guidance
  • Monitoring is aligned with maintenance schedules and safety constraints

Best for: Brownfield plants, legacy systems, and organizations needing practical, operator-trusted outcomes

5. Microsoft Defender XDR + Defender for IoT

Microsoft provides scalable convergence by integrating OT telemetry into enterprise XDR workflows, particularly effective in cloud-centric environments.

Best for: Azure-centric enterprises

6. Siemens – Converged Monitoring in Siemens Ecosystems

Siemens offers OT monitoring integrated with industrial architectures and enterprise SOC services, aligned with IEC 62443.

Best for: Siemens-heavy automation environments

7. Schneider Electric – Power and Infrastructure Convergence

Schneider focuses on converged monitoring for power systems, substations, and critical infrastructure with strong lifecycle integration.

Best for: Utilities and grid operators

8. Armis – Asset-Centric Converged Visibility

Armis enriches SOC telemetry by identifying unmanaged OT and IoT assets that often escape traditional monitoring.

Best for: IIoT-heavy environments

Architectural Patterns for Converged Monitoring

Successful implementations usually follow one of three patterns:

Pattern 1: OT-Native Monitoring + SIEM Correlation

OT tools feed curated events into SIEM platforms where IT context is added.

Pattern 2: XDR-Centric Convergence

Enterprise XDR platforms ingest OT telemetry directly and correlate across domains.

Pattern 3: Managed Converged SOC

A specialized provider operates monitoring across IT and OT with shared governance.

Each pattern has trade-offs in cost, control, and operational complexity.

Operational Challenges (and How to Avoid Them)

Common failure modes include:

  • Alert overload without operational context
  • SOC actions taken without OT approval
  • Poor trust between IT security and operations
  • Treating convergence as a tooling project

Mitigation requires governance, joint ownership, and clear escalation models.

Metrics That Actually Matter in Converged Monitoring

Forget vanity metrics. Measure:

  • Time to detect IT-to-OT lateral movement
  • Time to triage with OT context
  • Reduction in unsafe response actions
  • Percentage of alerts tied to real process risk
  • Operator acceptance of SOC recommendations

The Strategic Value of Converged Monitoring

Converged monitoring delivers more than detection:

  • It aligns cyber risk with operational risk
  • It improves executive and board-level understanding
  • It supports compliance with IEC 62443, NIS2, NERC CIP
  • It reduces the likelihood that security controls become safety hazards

Final Thoughts: Convergence Is an Operating Model, Not a Tool

Converged IT/OT monitoring is not achieved by buying another platform. It requires:

  • Respect for industrial reality
  • Shared ownership between IT security and OT engineering
  • Providers who understand both cyber threats and physical consequences

Organizations that get this right move from reactive security to resilient operations. Those that don’t will continue to detect incidents-after production stops.

For OT Ecosystem readers, the takeaway is simple:

Converged monitoring is no longer about visibility. It’s about survivability.

Leave a Reply

Your email address will not be published. Required fields are marked *