The Dragos Platform

The Dragos Platform

Visualize, Detect, & Respond to ICS/OT Cybersecurity Threats 

ICS/OT technology that enables and empowers your team

The Dragos Platform is the industry’s most trusted industrial control systems (ICS) cybersecurity technology–providing comprehensive visibility of your ICS/OT assets and the threats you face, with best-practice guidance to respond before a significant compromise.

Built by practitioners for practitioners, the Dragos Platform ensures your cybersecurity team is armed with the most up-to-date defensive tools to combat industrial adversaries, codified by our experts on the front lines every day hunting, combatting, and responding to the world’s most advanced ICS threats.

“We realize that gaining a more detailed understanding of our network environment corresponds directly with our capacity to preempt cyber threats, rapidly targeting them before they have a chance to present a risk to the continuity of our business and operations. With the enhanced visibility and asset information technology in the Dragos Platform, combined with the ability to map threat detections using the MITRE ATT&CK for ICS Framework, we know we have what we need to stay ahead of adversaries.”


Jason Nations, Senior Manager of Enterprise Security, Oklahoma Gas and Electric

In-depth ICS/OT asset identification


ICS & IT protocols supported

Comprehensive ICS/OT device data


ICS/OT device characterizations

Extensive ICS/OT vendor support


Coverage for models ABB, GE, Honeywell, Emerson, Rockwell & more

The industry’s most in-depth ICS/OT asset visibility

The Dragos Platform analyzes multiple data sources including protocols, network traffic, data historians, host logs, asset characterizations, and anomalies to provide unmatched visibility of your ICS/OT environment.

The industry’s most accurate threat detection

The Dragos Platform rapidly pinpoints malicious behavior on your ICS/OT network, provides in-depth context of alerts, and reduces false positives for unparalleled threat detection.

The industry’s most efficient ICS/OT investigation capabilities

The Dragos Platform provides expert-authored playbooks to guide your security team step-by-step throughout investigations, decreasing response time and improving the efficiency of your team’s workflow.

The industry’s most powerful combination of ICS/OT technology and team

Reinforce your ICS cybersecurity resources with practitioner-led asset identification and threat detection.

Virtual deployment with on-prem and cloud options

The Dragos Platform offers flexible, virtual deployment options for your unique ICS/OT environment

Virtual deployment with on-prem and cloud options

The Dragos Platform offers flexible, virtual deployment options for your unique ICS/OT environment

The Dragos Platform Difference

Don’t just see your network—understand it

Dragos Deep Packet Inspection capabilities drill into protocols to understand  ICS/OT asset behaviors and function codes, identify abuse, and detect potential threats.

Anticipate Adversaries with MITRE ATT&CK for ICS

Dragos Threat Detections are mapped to tactics and techniques in MITRE ATT&CK for ICS to provide deep context of threats to help reduce threat discovery time, false positives, and alert fatigue.

Stay one step ahead of adversaries with continuous updates

Dragos Knowledge Packs, delivered monthly, contain the latest IOCs, signatures, analytics, and investigation playbooks to proactively defend your environment and respond to threats more efficiently.

See the Dragos Platform in Action

Featured Technology Partners

Dragos and SEL are partnered to provide ICS asset owners unmatched ICS/OT technology—reinforced to withstand even the harshest industrial environments.

View partner details

Dragos and Emerson are partnered to protect industrial power and water operations from advanced cyber threats.

View partner details

Dragos and CrowdStrike are partnered to provide the most holistic cybersecurity offering for enterprise IT and industrial OT environments.

View partner details

Cyber threats don’t wait. Neither should you.