{"id":57068,"date":"2019-08-29T13:18:24","date_gmt":"2019-08-29T20:18:24","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?page_id=57068"},"modified":"2025-07-23T10:57:16","modified_gmt":"2025-07-23T14:57:16","slug":"manufacturing","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/solutions\/manufacturing\/","title":{"rendered":"Manufacturing"},"content":{"rendered":"<h1>Cybersecurity for Manufacturing<\/h1>\n<h3>Industrial Resilience: Securing Manufacturing Operations in the Digital Age<\/h3>\n<p>If you thought increasing efficiency was your only goal, it\u2019s time to rethink your priorities. The rise of digitalization in industrial operations brings increased flexibility and performance but also creates new security challenges.<\/p>\n<p>Ransomware attacks, supply chain vulnerabilities, and the growing use of remote connections all contribute to this increasingly complex threat landscape. Now, it\u2019s not just about boosting productivity\u2014it\u2019s about protecting your systems from threats that could bring everything to a halt.<\/p>\n<p>You\u2019ve already made key investments in security technologies. So, what more do you need? The answer isn\u2019t more tools, it\u2019s about making what you already have work seamlessly together to effectively protect your operations.<\/p>\n<p>Get a demoRead the solution brief<\/p>\n<p>\u00a0<\/p>\n<h3 class=\"c-title\">Taking Control: Proactive Security\u00a0for\u00a0Manufacturing<\/h3>\n<p><strong>Don\u2019t let today\u2019s hidden threats cause tomorrow\u2019s production shutdown. Take control, switch to a proactive stance to build industrial\u00a0resilience.<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Deep Industrial Knowledge: Tailored to Your\u00a0ICS<\/h3>\n<p>We understand that every ICS environment is unique. We ensure seamless integration that fits the specific needs of your operations, with support for over 350 industrial protocols (including proprietary ones)and more than 20 years of experience in deploying OT security solutions.  Gain real-time visibility, precise classification, and actionable insights across all asset types\u2014IT, OT, IoT, IoMT, and BAS\u2014at every Purdue level.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Support for Multiple Use Cases: More than\u00a0Visibility<\/h3>\n<p>ICS security isn\u2019t just about monitoring your environment; it\u2019s about taking control of it. Forescout goes beyond visibility by offering dedicated support for vulnerability and risk management, network security, and threat detection and response. Because security isn\u2019t just about seeing the problem\u2014it\u2019s about fixing it and ensuring your operations stay secure.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Flexible Deployment: Security That Adapts to Your\u00a0Environment<\/h3>\n<p>We know deployment can be challenging, especially with constraints on what you can connect or install within your industrial network. That\u2019s why we offer the flexibility of air-gapped, hybrid, or full cloud deployment. With Forescout, you can deploy sensors as appliances, on custom hardware, or as containers. Minimize downtime and simplify installation with flexible discovery options that reduce the need for SPAN ports.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Comprehensive Risk Management: More Than Just\u00a0Cybersecurity<\/h3>\n<p>Security is only part of the risk management equation. When network misconfigurations, unresponsive devices, or dangerous operations put your industrial resilience at risk, focusing on vulnerabilities only isn\u2019t enough. You need a comprehensive approach, one that only a platform like Forescout can provide. A proactive strategy that empowers you to take control, prioritize risks, and take immediate action to minimize your security exposure.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Network Security: Take Control of Access and\u00a0Segmentation<\/h3>\n<p>Managing network security across complex environments is no easy feat, especially when you\u2019re unsure about what to block or allow. With Forescout, we make it effortless enabling you to orchestrate and streamline policies across diverse vendors and IT\/OT networks. Our policy engine, paired with customizable templates, lets you simulate policies before enforcement, ensuring you maintain full control and manage attack surfaces effectively.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Contextualize Threats and Uncover Hidden\u00a0Vulnerabilities<\/h3>\n<p>Threat intelligence is not only about understanding threats, it\u2019s also about tracking adversaries, attack techniques, and campaigns specific to your industry. Forescout provides comprehensive protection by identifying and contextualizing risks and vulnerabilities that others miss. With Vedere Labs\u2019 research integrated into the platform, we are able offer tailored risk indicators for manufacturing, including VL-KEVs, keeping you ahead of the evolving threat landscape.<\/p>\n<h2 class=\"c-title\">Sample Network Architecture in  a Manufacturing Environment <\/h2>\n<p>This diagram shows a typical deployment architecture of the Forescout solution for industrial plants and manufacturing deployments. Various sensor deployment options are available, ranging from high-performance appliances for centralized deployments to ruggedized and lighter low-cost models as well as deployment on existing network infrastructure equipment for use in decentralized or segmented networks with limited throughput. Further integrations with the security ecosystem to exchange insights, automate workflows and initiate response to emerging cyber threats are available.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2021-Manufacturing-Architecture-Diagram-1200px.png\" loading=\"lazy\"><\/p>\n<h2 style=\"text-align: center;color: #009dea\">Security Across Manufacturing Verticals<\/h2>\n<p><a href=\"#tab-c4bfc8a0dc705151a8cb8e75b53fe8d8-0\" class=\"c-tabs__link js-tabs-link\">Automotive<\/a><\/p>\n<p style=\"font-size: 130%\">With complex interconnected systems and supply chain dependencies, automotive manufacturing faces cybersecurity challenges that can disrupt operations, damage equipment, and compromise quality.<\/p>\n<p>\u00a0<\/p>\n<h4>Make Your Production Resilient<\/h4>\n<p>Forescout helps you prevent attacks that can manipulate production processes or halt your assembly line. For example, stopping a hacker from altering the programming of a robotic arm, preventing it from damaging a vehicle chassis, ensures continuous operations.<\/p>\n<h4>Secure Individual Components<\/h4>\n<p>Vulnerable devices such as HMIs, EWS, and sensors are often entry points for attackers, providing access to broader control systems. Forescout ensures these critical components are secured. Picture this: a pressure sensor in a paint booth starts reporting abnormal readings. Our platform immediately alerts your team, allowing them to investigate and prevent attackers from manipulating pressure levels that could ruin the paint job on hundreds of cars.<\/p>\n<h4>Implement Robust Segmentation<\/h4>\n<p>As automotive systems become more connected, segmenting your network is crucial to protect critical production zones. Forescout helps you implement strong network security, ensuring that if one part of your network is compromised, the attack doesn\u2019t spread across your entire system. Visualize your production site: a security issue emerges in the body shop. With the ability to isolate affected devices or systems, you can prevent disruptions from reaching the engine assembly line and impacting other critical processes.<\/p>\n<p><a href=\"#tab-c4bfc8a0dc705151a8cb8e75b53fe8d8-1\" class=\"c-tabs__link js-tabs-link\">Food &amp; Beverages<\/a><\/p>\n<p style=\"font-size: 130%\">Cyber threats don\u2019t just disrupt production\u2014they can steal your data and cripple your operations. With growing complexity and interconnected systems, the risk of an attack is higher than ever. It\u2019s time to close the gaps and protect what matters.<\/p>\n<p>\u00a0<\/p>\n<h4>Secure Your Core Operations<\/h4>\n<p>Your production floor is the heart of your business, so securing your PLCs, SCADA systems and industrial control systems is crucial to prevent downtime, spoilage, and quality issues. With real-time monitoring and advanced anomaly detection, Forescout helps protect your systems by identifying deviations as they happen. For example, detecting abnormal temperature or humidity fluctuations in real time allows you to address potential production issues before they escalate into significant losses.<\/p>\n<h4>Protect Your Competitive Edge<\/h4>\n<p>Your recipes and production processes are your competitive advantage, making their protection essential. We help secure your valuable data with strict access controls and dynamic segmentation, ensuring that unauthorized access attempts trigger immediate alerts. This way, you can stop breaches before they even happen.<\/p>\n<h4 style=\"text-align: center\">Keep the Enterprise Secure<\/h4>\n<p style=\"text-align: center\">As IT and OT systems converge, securing your industrial infrastructure grows increasingly complex. A single breach can rapidly spread across environments, disrupting operations. Forescout provides the visibility and control you need to detect suspicious activity, such as suspicious communication between devices, and take action to stop threats before they escalate.<\/p>\n<p><a href=\"#tab-c4bfc8a0dc705151a8cb8e75b53fe8d8-2\" class=\"c-tabs__link js-tabs-link\">Chemicals &amp; Pharmaceuticals<\/a><\/p>\n<p style=\"font-size: 130%\">When threats have the potential to cause physical harm, whether to patient safety or the environment, being reactive is no longer an option. It\u2019s time to take a proactive approach and stay ahead of the risks.<\/p>\n<p>\u00a0<\/p>\n<h4>Can You Trust Your Supply Chain?<\/h4>\n<p>The weakest link in your supply chain can open doors to devastating breaches. Forescout empowers you to take control with real-time oversight across your industrial environment. We secure updates, remote access, and transient devices, while monitoring interactions to detect unauthorized changes or risky operations. For example, we can track maintenance sessions to spot unexpected behavior and prevent incidents before they escalate.<\/p>\n<h4>Gain Control Across Your Distributed Infrastructure<\/h4>\n<p>Managing operations across multiple sites with varying systems can create security gaps, putting your organization at risk. Forescout provides the unified visibility you need to stay proactive and ahead of potential threats. Imagine detecting an outdated software version on a critical system at a remote site in real time and address the issue immediately, without waiting for someone to open a ticket or report it.<\/p>\n<h4>Balance Compliance and Operational Integrity<\/h4>\n<p>Compliance isn\u2019t just about data protection\u2014it\u2019s about ensuring process integrity and operational safety. We help you align with internal policies or frameworks like NIST CSF and IEC 62443 to reduce risk and safeguard production. For example, implementing security controls aligned with IEC 62443 to prevent unauthorized access while storing authentication logs to ensure audit readiness.<\/p>\n<h2 style=\"text-align: center\">Manufacturer Customer Confidence<\/h2>\n<p><button class=\"slider-navigation\" data-corresponding-slide=\"0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/logo_280x160-ardentec.png\" loading=\"lazy\"><\/button><button class=\"slider-navigation\" data-corresponding-slide=\"1\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/European-Defense-Company-Icon.png\" loading=\"lazy\"><\/button><button class=\"slider-navigation\" data-corresponding-slide=\"2\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/Fortune-500-Manufacturing-Icon.png\" loading=\"lazy\"><\/button><\/p>\n<figure>\n<blockquote>\n<p>By using the Forescout platform as extensively as possible, not only did we improve our overall network security and visibility but also the effectiveness of our endpoint security investments.<\/p>\n<\/blockquote><figcaption>Chris Chou<br \/>\nDirector of Management Information Systems<br \/>\nArdentec<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/ardentec-case-study\/\" title=\"learn more\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\">learn more<\/a><\/p>\n<figure>\n<blockquote>\n<p>See how a major European defense company deploys building automation security and SOC integration for critical manufacturing.<\/p>\n<\/blockquote>\n<\/figure>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/european-defense-company\/\" title=\"learn more\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\">learn more<\/a><\/p>\n<figure>\n<blockquote>\n<p>When I saw the level of visibility we had in less than three weeks \u2013 and data presented in a way that I could present to leadership and partners \u2013 that sold me. The speed at which Forescout provides actionable intelligence makes it more valuable than competitive solutions I\u2019ve used in the past.<\/p>\n<\/blockquote><figcaption>Chief Information Security Officer<br \/>\nFortune 500 Manufacturing Company<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/fortune-500-case-study\/\" title=\"learn more\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\">learn more<\/a><\/p>\n<p>Previous<br \/>\nNext\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity for Manufacturing Industrial Resilience: Securing Manufacturing Operations in the Digital Age If you thought increasing efficiency was your only goal, it\u2019s time to rethink your priorities. The rise of digitalization in industrial operations brings increased flexibility and performance but also creates new security challenges. Ransomware attacks, supply chain vulnerabilities, and the growing use of [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":0,"parent":80153,"menu_order":196,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-57068","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Manufacturing &amp; Industrial Cybersecurity Solutions: IT, OT &amp; IoT Security<\/title>\n<meta name=\"description\" content=\"Forescout&#039;s manufacturing and industrial cybersecurity platform protects from OT, IT and IoT threats and complies with NIST CSF, NIS2 and other regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/solutions\/manufacturing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manufacturing &amp; Industrial Cybersecurity Solutions: IT, OT &amp; IoT Security\" \/>\n<meta property=\"og:description\" content=\"Forescout&#039;s manufacturing and industrial cybersecurity platform protects from OT, IT and IoT threats and complies with NIST CSF, NIS2 and other regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/solutions\/manufacturing\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T14:57:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/manufacturing\/\",\"url\":\"https:\/\/www.forescout.com\/solutions\/manufacturing\/\",\"name\":\"Manufacturing & Industrial Cybersecurity Solutions: IT, OT & IoT Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/manufacturing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/manufacturing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\",\"datePublished\":\"2019-08-29T20:18:24+00:00\",\"dateModified\":\"2025-07-23T14:57:16+00:00\",\"description\":\"Forescout's manufacturing and industrial cybersecurity platform protects from OT, IT and IoT threats and complies with NIST CSF, NIS2 and other regulations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/manufacturing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/solutions\/manufacturing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/manufacturing\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\",\"width\":50,\"height\":34},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/manufacturing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/www.forescout.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Manufacturing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manufacturing & Industrial Cybersecurity Solutions: IT, OT & IoT Security","description":"Forescout's manufacturing and industrial cybersecurity platform protects from OT, IT and IoT threats and complies with NIST CSF, NIS2 and other regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/solutions\/manufacturing\/","og_locale":"en_US","og_type":"article","og_title":"Manufacturing & Industrial Cybersecurity Solutions: IT, OT & IoT Security","og_description":"Forescout's manufacturing and industrial cybersecurity platform protects from OT, IT and IoT threats and complies with NIST CSF, NIS2 and other regulations.","og_url":"https:\/\/www.forescout.com\/solutions\/manufacturing\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-07-23T14:57:16+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/solutions\/manufacturing\/","url":"https:\/\/www.forescout.com\/solutions\/manufacturing\/","name":"Manufacturing & Industrial Cybersecurity Solutions: IT, OT & IoT Security","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/solutions\/manufacturing\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/solutions\/manufacturing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","datePublished":"2019-08-29T20:18:24+00:00","dateModified":"2025-07-23T14:57:16+00:00","description":"Forescout's manufacturing and industrial cybersecurity platform protects from OT, IT and IoT threats and complies with NIST CSF, NIS2 and other regulations.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/solutions\/manufacturing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/solutions\/manufacturing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/solutions\/manufacturing\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","width":50,"height":34},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/solutions\/manufacturing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.forescout.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Manufacturing"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/57068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=57068"}],"version-history":[{"count":3,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/57068\/revisions"}],"predecessor-version":[{"id":107447,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/57068\/revisions\/107447"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=57068"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=57068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}