Nozomi Networks and Industrial Defender, two industry pioneers in OT and industrial cybersecurity, today announced a strategic alliance to improve the security of vital infrastructure and manufacturing facilities. The combined solution of the two firms offers the most comprehensive and in-depth view of OT assets and behavior in the market by combining change and configuration monitoring from Industrial Defender with asset visibility and threat detection capabilities from Nozomi Networks.
“For the expanding cyber risks to operational technology, collaboration with industry experts is crucial for a successful defense. That’s why we’re so pleased to collaborate with Nozomi Networks, the industry-standard platform for monitoring assets and identifying security threats in OT and IoT settings “Jay Williams, Industrial Defender’s CEO, put it like this.
Manufacturers, power utilities, oil and gas companies, and other operators of critical infrastructure may all benefit from “our integrated solution,” which provides a more comprehensive picture of asset activity and behavior and better diagnoses possible security issues.
According to Edgard Capdevielle, CEO of Nozomi Networks, “the alliance between Industrial Defender and Nozomi Networks helps industrial operators to acquire vital knowledge to spot abnormalities and enhance their overall security posture.” Together, we can provide asset owners and operators with a more complete picture of their OT environment, thanks to the in-depth asset data made available by Industrial Defender’s endpoint configuration management features.
The joint solution delivers:
- Active, agentless, and passive data collection methods for asset information including OS details, software installed, patches, open network ports, firewall rules, user accounts, and NICsComprehensive and centralized view of asset inventory, vulnerability database, process variables, and threat detection data
- Change monitoring capabilities that automatically collect, normalize, and report changes in the OT environment based on configuration baselines
- Automated policy assessments and reports for standards such as NIST CSF, NERC CIP, and ISA/IEC 62443
- Visibility and threat detection across connected and disconnected devices
As a result of having these features at their disposal, operators may now properly catalogue, track, and evaluate all OT infrastructure assets in an effort to reduce vulnerability in both areas.