Claroty’s New CPS Library Takes Aim at the Most Chaotic Corner of Cybersecurity: Device Identity
- Cyber Jill
- 8 minutes ago
- 4 min read
In the sprawling world of cyber-physical systems—industrial controllers, medical devices, manufacturing lines, energy infrastructure—security teams have been fighting a quiet but brutal battle: no one can agree on what anything is actually called.
A single controller might report three different names depending on the protocol you ask. Another might hide its product code entirely. Vendors publish advisories full of vague model families instead of specific variants. And CVE listings often carry just enough ambiguity to leave security teams wondering whether a vulnerability actually applies to the device in front of them.
This is the naming crisis at the heart of operational technology—where attackers exploit firmware quirks, configuration variants, and unpatched modules, while defenders are stuck deciphering whether the asset is that PLC or the nearly identical one two shelves over.
Now Claroty is trying to put a hard stop to the chaos.
The First Attempt at a Universal Translator for CPS Assets
Today, the company unveiled the CPS Library, pitched as the first AI-powered, authoritative mapping engine capable of deterministically identifying CPS assets and accurately assigning vulnerabilities—even when devices report almost nothing about themselves.
This isn’t just another device inventory feature. Claroty is effectively building the Rosetta Stone for OT and IoMT hardware, backed by data and validation from major vendors including Rockwell Automation and Schneider Electric.
Under the hood is a multi-agent AI system that ingests network-level identifiers, mixed-format naming strings, vendor catalogs, firmware relationships, and advisory data, then reconciles them into a single “ground truth” product code. The CPS Library uses an expansive evidence graph—enriched with OEM-validated reference points—that helps its AI agents triangulate the actual identity of the device in the field.
Claroty calls it deterministic asset identification. Security teams might call it long-overdue sanity.
Why the Industry Needed This Yesterday
Team82, Claroty’s research arm, dropped a companion report that quantifies how broken the current state of CPS identification really is:
88% of CPS assets don’t transmit an exact product code
76% report inconsistent names
41% don’t broadcast an OS version
33% don’t broadcast an OS name
Three-quarters of models have multiple naming variants depending on protocol or integration
And wildly, mapping accuracy for one prominent OEM jumped from 4% to 83% when Claroty applied its new AI-driven reconciliation process
Those numbers don’t just reflect messy data—they reflect systemic exposure.
When the asset layer itself is blurry, everything above it weakens: CVE matching, patch validation, compensating controls, compliance, incident response… even basic risk reporting.
For many organizations, “last-mile remediation” often ends with a shrug. You can’t patch what you can’t precisely identify.
The Hidden Complexity That Breaks Vulnerability Attribution
Unlike IT assets, CPS devices are modular ecosystems. The same model number can represent hardware with different CPUs, NICs, or interface modules—each introducing separate firmware trees and their own unique vulnerabilities.
A CVE might affect a controller only when paired with a certain communication module. Another might only apply to devices shipping with a particular OS variant. But because vendors rarely include this granularity in advisories, operators are left to guess.
The CPS Library pulls in missing details that rarely appear digitally: default configurations, firmware lineage, vendor-approved patch levels, and the relationships between replaceable components. It then aligns those with real-world identifiers captured from network traffic, even when devices omit the most critical fields.
The result:
25% improvement in vulnerability attribution accuracy
56% of devices receiving new or updated remediation guidance
29% reduction in false negatives
27% reduction in false positives
That’s not marginal uplift—that’s transformational.
Inside the AI System Built for CPS Reality
Claroty’s architecture isn’t a single model but a federation of specialized agents:
NLP engines that parse messy, protocol-derived naming strings
Statistical reasoners that assign confidence to correlations
Domain-guided logic modules trained to understand hardware generations, replacement cycles, and firmware compatibility
An ensemble voting system built to suppress noise and reconcile contradictory data
A human-in-the-loop verification loop that continuously enriches the evidence graph and retrains models on new ground truth
Where traditional approaches rely on one imperfect signal—say, a Modbus identifier or a vendor PDF—the CPS Library triangulates hundreds.
Claroty is positioning this not as an enrichment feature, but as infrastructure: the canonical, vendor-validated reference system that other security layers plug into.
The Bigger Picture: Fixing CPS Security at the Foundation
The current vulnerability management pipeline for cyber-physical systems is effectively broken because the naming layer has never been stable. Inconsistency at the bottom creates confusion at the top—CVE authorities publish partial advisories, vendors contradict themselves across product lines, and operators waste days interpreting model families that span dozens of variant configurations.
Claroty’s CPS Library attempts to collapse all that noise into a deterministic mapping: a single product identity, a single set of vulnerabilities, a single remediation path.
If it scales—and if more OEMs participate—it could become one of the most important underlying data layers in industrial and healthcare cybersecurity.
Because until now, defenders have been securing some of the world’s most sensitive infrastructure with device identities that resemble a pile of sticky notes. And threat actors have benefitted from that ambiguity for years.
Standardizing CPS identity is more than a visibility problem. It’s the prerequisite for everything else in cyber-physical risk.