IoT / OT Use Case
Your Factory Floor Has More Endpoints Than Your Office. And Zero Detection.
The average manufacturing plant runs 5,000+ connected devices — PLCs, HMIs, SCADA systems, sensors, cameras, badge readers. Critical infrastructure runs 10x that. None of it sends logs to your SIEM. Most of it can't run an agent. It speaks Modbus, BACnet, DNP3, OPC-UA — protocols your security stack has never heard of.
But attackers have. Triton targeted safety systems at a petrochemical plant. Industroyer took down Ukraine's power grid. PIPEDREAM was built to attack ICS/SCADA across multiple industrial protocols. These weren't IT attacks that spilled into OT. They were purpose-built to exploit the monitoring gap.
Your IT SOC is blind to OT. Your OT team monitors for process safety, not security. The gap between them is where nation-state actors live.
How spotr.io does it?
spotr.io doesn't care what protocol your data speaks. Schemaless ingestion means Modbus registers, SCADA telemetry, BACnet property reads, OPC-UA node values, and syslog from industrial firewalls all flow through the same detection engine. No data transformation. No schema mapping project. Plug it in, detect on it.
Anomaly models catch behavioral drift — a PLC that's issued the same command pattern for 3 years suddenly doing something different. Threshold models catch volumetric anomalies — a sensor polling rate that doubles overnight. Sequence models catch attack playbooks — reconnaissance of the engineering workstation → credential access → controller reprogramming. Rate models catch communication pattern changes — devices talking to new endpoints or at unusual frequencies.
Your SIEM can't ingest it. Your EDR can't install on it. Your NDR only sees network patterns. spotr.io detects on the data itself — in real time, at any volume, in any format.
The most critical infrastructure has the least detection coverage. That's the gap.