SCADAguardian Update Enhances OT Visibility & Threat Detection

SCADAguardian Update Enhances OT Visibility & Threat Detection

Extraordinary customer care and responsiveness is a key value at Nozomi Networks. Since launching version 18.0 in June, we‘ve heard from customers that there are a couple of other things we could do to make them even more efficient.

Based on customer input, we’ve released Version 18.1, including new dashboards for IT/OT integration and 20x faster performance for rules-based threat detection analysis.

GE Power Selects Nozomi Networks for Advanced ICS Cyber Security

GE Power Selects Nozomi Networks for Advanced ICS Cyber Security

We’re excited to tell you that GE and Nozomi Networks have joined forces to provide our advanced cyber security solution to power utilities and critical infrastructure operations around the world.
Our global agreement gives GE Power customers immediate access to our leading real-time ICS visibility, network monitoring and cyber security solutions.

How ICS Data Analytics & Cyber Security Deliver True Business Value

How ICS Data Analytics & Cyber Security Deliver True Business Value

Last month we launched our partnership with digital transformation heavyweight Atos. Combining Atos analytics on data from industrial devices, with our cyber security processes, takes operational visibility and OT security to new levels.

But the real value goes way beyond cyber security – to include lower total cost of ownership and business resilience. Read on to learn more.

Overcoming IT/OT Cybersecurity Convergence Roadblocks

Overcoming IT/OT Cybersecurity Convergence Roadblocks

Many organizations still view IT and OT cyber security as unique issues to address, yet the need for convergence has never been more important. Attackers exploit the security gaps between IT and OT technologies exactly because those responsible for their defense have different priorities.

While challenging to achieve, IT / OT convergence will eliminate security gaps and reduce overall cyber risk. Read on to learn more.

Open Source Software Exposes ICS Device Vulnerabilities to Hackers

Open Source Software Exposes ICS Device Vulnerabilities to Hackers

It’s disturbing to think that disruption and damage to our critical infrastructure can happen by simply combining the use of OSS tools with malicious intent. Fortunately, those same tools are being used by ICS security researchers around the world to increase industrial control systems cyber security.

Read on to learn why transportation, communications, energy and emergency services are so exposed, and what’s being done to close the ICS cyber security gap.