Implementing the TSA Security Directives
What Are the TSA Security Directives?
The TSA Security Directives are issued by the US Department of Homeland Security (DHS). These Directives target critical oil and gas pipelines, rail transit systems and the aviation sector. At a high level, they require owners and operators to develop and implement a cybersecurity incident response plan, complete a vulnerability assessment to identify potential risks in their systems and report security breaches to CISA within a specific timeframe.

Which TSA Security Directive Requirements Does Nozomi Networks Support?
1. Conduct a Cybersecurity Vulnerability Assessment
2. Establish and Implement a Cybersecurity Implementation Plan
3. Information Protection
How Does Nozomi Networks Help Meet TSA Security Directives?
Identify: Discover all critical devices and their vulnerabilities
Protect + Detect: Proactively prevent cyber incidents
Respond: Act quickly and stay focused
Why Nozomi Networks?
These are just some of the reasons that we are loved by our customers.
Relationships
We truly value our customers and take pride in having the industry's highest customer retention rate. But don’t take our word for it. Read why our customers rank us #1 on Gartner Peer Reviews here.
Accuracy & Depth
Our high-accuracy asset intelligence and security data delivers the insights that matter to our customers. Our solution supports hundreds of protocols for passive discovery, as well as smart polling and an endpoint security sensor, making the flexibility and depth of our asset inventory and anomaly detection capabilities unmatched.
Robust Data Reporting
Our Dashboards and Content Packs allow users to quickly create a shareable format for the data they need to meet and prove compliance with regulatory standards, including NERC CIP.
Sector Expertise
Nozomi Networks is the leader in securing critical infrastructure. Some of the largest oil and gas operators and transportation organizations in the world rely on us to protect their industrial environments.

DEMO VIDEO
Request a Personalized Demo
See how easy it is to:
- Discover all OT, IoT, ICS, IT, edge, and cloud assets on your networks
- Gain immediate awareness of cybersecurity threats, risks and anomalies
- Detect security incidents and respond quickly
- Consolidate security, visibility, and management within a single platform