Solution integration offers AI-powered threat visibility, analysis and remediation along with military-grade encryption, policy enforcement and simplified policy management
Seattle, WA and San Francisco, CA | March 16, 2021 — Tempered Networks and Nozomi Networks today announced a new partnership and product integration to deliver a full-featured industrial security solution for network visibility, threat detection and remediation. The joint offering integrates Nozomi Networks’ leading network visibility, threat detection and incident response system with Tempered Network’s Zero Trust policy enforcement and centralized software-defined perimeter management console. Today’s sophisticated security threats are driving requirements for not only extreme visibility and intelligent threat detection, but also automated remediation that can lock-down vulnerable systems while ensuring continued availability for authorized access and continuity of business.
“As the leader in OT and IoT security visibility and threat detection, Nozomi Networks gives us a powerful partner to deliver greater insight and remediation capabilities to our customers,” said Jeff Hussey, Founder and CEO of Tempered Networks. “The AI-powered network analysis and anomaly detection that they provide can drive more accurate micro-segmentation and security policy enforcement into our Airwall platform, providing a more secure, rapid response approach against industrial-grade network attacks.”
“Tempered Airwall delivers the military-grade encryption and secure access policy enforcement that many of our joint customers rely upon to quickly remediate anomalies and threats in their networks”, said Chet Namboodri, Nozomi Networks Senior Vice President of Business Development and Alliances. “The combination of threat visibility and automated enforcement significantly improves security response. Ubiquitous threats like the SolarWinds attack continue to emerge, and industrial connectivity for remote work and connected smart devices continues to accelerate. Our combined offerings provide strong detection and defense against the rapid proliferation of advanced persistent threats, actively buttoning down attack surfaces.”
The product integration includes the ability of Tempered to mirror secure traffic to Nozomi Networks solutions through a fully encrypted overlay for greater analysis and insight. Armed with AI-driven insights from Nozomi Networks, Airwall customers can take remediation steps or refine Tempered security policies through the Airwall Conductor management console API. The Nozomi Networks solution and Tempered Networks’ Conductor work in concert to refine Airwall zero trust policies and address identified threats, going beyond the capabilities of traditional network security devices like firewalls or remote access solutions.
“A two-way integration of network monitoring of IoT devices with secure, zero-trust communications is brilliant,” said Richard Stiennon, industry analyst with IT-Harvest and author of Security Yearbook 2020. “Ensuring that all communications are stealthed and encrypted while preserving visibility into traffic is a winning combination.”
The joint solution is available today with the release of Tempered Networks Airwall 2.2.11. Contact the respective vendors for platform pricing details.
About Nozomi Networks
Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection and deep operational insights for OT and IoT environments. Customers rely on us to minimize risks while maximizing resilience. www.nozominetworks.com
About Tempered Networks
Tempered makes the industry’s only truly native Zero Trust Software-Defined Perimeter (SDP) solution. Airwall is the modern air gap for all connected things. Airwall makes it easy to create and maintain hyper-secure networks across complex infrastructure anywhere, including IT/OT/ICS/SCADA, remote and in the cloud. Airwall networks are multi-factor authenticated, micro-segmented, encrypted end-to-end, and impervious to lateral movement. Ready to make your company’s critical assets and infrastructure invisible to threats? Visit https://tempered.io.