I have run into several instances where the operating system underpinning a security system has become a point of contention between IT/Cybersecurity teams and the physical/corporate security teams. Confirming what OS is being used and how the system will interact with tools such as CrowdStrike frequently takes multiple discussions with sales teams and engineers from the manufacturers. The IT teams I have worked with prefer regular operating systems that can be monitored with their existing tools and avoid (or ban) the use of non-standard, hardened operating systems.
Has anyone else run into this issue? Is it common among manufacturers to use proprietary/hardened operating systems for their platforms? If so, how do you satisfy IT and cybersecurity requirements when connecting these systems to the corporate network?
*** *** ******* ***** ***-**** ** devices **** ** ** *******? ***** types ** ******* ******** *** ***** OS **** *** **** ********** *** stripped ****.
** *** *** ******* ***** ******* to *** ****** ******* ** ***, etc., **** ***** *** ********* ***-***-***** OS **** ** ******* *** *****.
*** **** ******* **** **** ******* or ***** ********* ****** *** ***-***-***** Raspberry ** *** ******** **, ** they *** *** ** ****** **** too ****.
*** ****** *** ******** ** **** type ** ** *** *** ****** the ********, ***. *** ** **** useful ** ************* *** ****** *** who ******** ***** **.