Nozomi Networks Trust Center

Welcome to the Nozomi Networks Trust Center, your gateway to understanding the robust security measures we have in place to protect our systems and your data. At Nozomi Networks, we prioritize the security and privacy of our customers' information, ensuring that our practices meet the highest industry standards.

Our Governance, Risk, and Compliance Team is dedicated to maintaining a secure environment through a combination of advanced security features and rigorous audits.

We follow industry best practices to ensure system resilience and earn your trust with sensitive data. Through strong security policies, we help clients meet compliance and gain peace of mind. Nozomi Networks continually invests in advanced technology and skilled teams to protect your data and uphold the highest standards of security and privacy.

Information Security

Organizational Security

Nozomi Networks is committed to develop, deliver, and operate cybersecurity and visibility solutions for industrial control systems with the highest achievable level of security, integrity and availability. And to protect corporate information, personal information, and customer data against loss, unauthorized access and disclosure.

To achieve this goal, Nozomi Networks has implemented an Information Security Management System (ISMS):

  • Development and delivery of highly secure products and services to Nozomi Networks’ customers and partners. 
  • Protection of customer information. 
  • Protection of Nozomi Networks’ information assets. 
  • Maintaining a culture of competency, accountability, and security-awareness. 

Personnel Security

Nozomi Networks places a strong emphasis on personnel security to ensure the protection of its information assets.

Policies

The company has developed a comprehensive set of security policies that cover a wide range of topics. These policies are shared with and made available to all employees and contractors who have access to Nozomi Networks' information assets.

Training and Awareness

One of the key components of personnel security at Nozomi Networks is the Security Awareness Training program. All employees are required to attend this training upon hire and annually thereafter. Additionally, the Security team provides regular security awareness updates through various channels.

Background Checks

Employee vetting is another critical aspect of Nozomi Networks' personnel security practices. The company performs background checks on all new employees in accordance with local laws. These checks are also required for contractors and include criminal, education, and employment verification.

Non-Disclosure Agreements (NDAs)

All new hires are required to sign Non-Disclosure and Confidentiality agreements to protect sensitive information.

Onboarding and Offboarding Processes

Nozomi Networks has strict onboarding and offboarding requirements to ensure the appropriate access (and revocation) to information assets.

Corporate Security

Nozomi Networks is committed to ensuring the highest level of corporate IT security. Here's how we approach various aspects of IT security:

Endpoint Security

Strict controls are applied to endpoints connected to Nozomi Networks' systems, especially those with access to sensitive information. This is an integral part of the overall IT security framework.

Monitoring and Logging

Continuous monitoring logs all database access and ships the logs to a centralized system. Administrative access, use of privileged commands, and other access activities are logged and retained. Log information is protected against tampering and unauthorized access.

Malware Protection

Servers and endpoint devices such as laptops and desktops are protected and monitored from malware, malicious codes, and unsafe applications by deploying a set of protection tools.

Physical Security

Access to offices, computer rooms, and work areas containing sensitive information is physically restricted to authorized personnel only. Employees use access cards to enter offices and maintain a visitor log. Surveillance cameras and security measures are in place to monitor buildings. Physical security audits are conducted.

Policies Summary

At Nozomi Networks, transparency is a foundational principle that guides our approach to cybersecurity and governance. We are committed to upholding the strictest information security requirements, ensuring that our systems, data, and operations remain resilient and trustworthy. Our policies are not just guidelines—they are enforceable standards that apply to every employee, reinforcing a culture of accountability and vigilance. This document provides a high-level summary of our core information security policies, outlining the frameworks and expectations that safeguard our organization and the clients we serve.

Acceptable Use of Technology

The Acceptable Use of Technology Policy outlines the guidelines for using technology resources at Nozomi Networks. It emphasizes responsible and diligent conduct to protect company assets from loss, compromise, or harm. The policy covers various aspects such as data management, use of email, computers, software installations, mobile phones, internet access, public Wi-Fi, VPN, communication services, phishing/scam emails, Dropbox, removable media, accounts and secrets, passwords, cloud services, and generational AI models. Non-compliance with the policy may lead to disciplinary actions, including termination of employment.

Access Control

The Access Control Policy establishes requirements for authentication, authorization, and accounting (AAA) to ensure the security of Nozomi’s assets and information processing facilities. It mandates that access is limited to authorized personnel only, based on the principles of least privilege and need-to-know. The policy covers user access management, system and application, access control, and access to networks and hosted services. It also includes provisions for audit controls, user registration and de-registration, privileged access rights management, and periodic reviews of access rights. The policy applies to all Nozomi employees, contractors, and anyone with access to Nozomi’s resources and network.

AI Policy

The AI Policy document outlines guidelines for the development, implementation, use, and monitoring of AI and machine learning (ML) technologies within Nozomi Networks. It emphasizes responsible and ethical AI/ML system development, ensuring compliance with regulatory standards like the EU AI Act. The policy covers all AI/ML systems embedded in Nozomi Networks’ software and services, as well as third-party AI tools used within the organization. Key principles include fairness, transparency, data privacy, and security. The policy applies to all employees, contractors, and third-party vendors, aiming to enable innovation while adhering to legal and regulatory requirements.

Business Continuity Policy

The Business Continuity Policy outlines the framework and requirements for Nozomi Networks’ Business Continuity Plan (BCP), ensuring consistent availability and delivery for products, operations, and services, while maintaining the safety of personnel during disasters or disruptions. The policy emphasizes leadership commitment, roles and responsibilities, risk assessment, communications plan, continuity and recovery objectives, disaster recovery plan, functional business continuity plan, exercise and testing, performance evaluation, continual improvement, and adherence to legal and contractual obligations.

Change Management Policy

The Change Management Policy outlines the responsibilities and procedures for managing changes to Nozomi Networks’ information assets, including physical and virtual network devices, software products, internal information systems, and customer-deployed applications. It emphasizes the importance of identifying, tracking, planning testing, and approving changes while assessing potential risks and communicating details to relevant stakeholders. The policy also includes fallback procedures for aborting and recovering from unsuccessful changes and mandates that all exceptions involving security reviewed and approved by the appropriate manager. This policy applies to all employees and contractors involved with the development, management, and support of these assets.

Data Handling Policy

The data handling policy outlines the guidelines for managing and protecting data at Nozomi Networks. It covers data classification, disposal, and retention, ensuring that all data, whether stored physically or virtually, is handled securely. The policy mandates encryption for sensitive data, regular audits, and proper labeling. It also specifies the retention periods for different types of data and the secure disposal of records and storage media. The policy applies to all Nozomi Networks employees and contractors, emphasizing the importance of protecting data to prevent unauthorized access or breaches.

Encryption Policy

The Encryption Policy outlines the cryptographic controls and key management practices for protecting sensitive information at Nozomi Networks. It mandates the use of state-of-the-art cryptographic solutions for data-at-rest and in transit, based on international standards like NIST SP 800-131a and approved algorithms such as AES for confidentiality and SHA-256 for integrity. The policy covers various types of information, including customer data, PII, passwords, intellectual property, and compliance records. It also specifies that encryption mechanisms must meet regulatory and legal requirements and be approved by IT or the CTO.

Human Resources Security Policy

The Human Resources Security Policy outlines the procedures and guidelines for managing the hiring, training, and termination of employees and contractors at Nozomi Networks. It includes background verification checks, contractual agreements, and mandatory information security training for all staff members. The policy also details the responsibilities of employees, managers, compliance, and IT in ensuring timely completion of training and enforcing access restrictions for non-compliance. Additionally, it addresses the termination process, including the immediate disabling of access to company information and facilities, and the return of company property. The policy is classified and confidential.

Information Security Policy

The Information Security Policy outlines Nozomi Networks’ commitment to developing, delivering, and operating cybersecurity and visibility solutions for industrial control systems with the highest level of security, integrity, and availability. The policy aims to protect corporate information, personal information, and customer data against loss, unauthorized access, and disclosure. To achieve this, Nozomi Networks has implemented an Information Security Management System (ISMS) according to the ISO 27001:2022 standard. The ISMS includes applicable policies, processes, and measurable controls relevant to business functions, and it takes input from customer requirements, contractual agreements, and the needs of interested parties. The policy emphasizes leadership commitment, periodic risk assessments, and continual improvement to maintain stakeholder trust and support business objectives.

Office Management Procedure

The Office Management Procedure document outlines the requirements for guest access, badge issuance, and access control to the computer room at Nozomi Networks. It specifies that all guests must report to the Office Manager upon arrival, and their visit details are recorded in a visitor log. The Office Manager is responsible for managing access to the offices and issuing badge access cards to employees and multi-day visitors. The IT Manager controls physical access to the computer room, ensuring that only authorized personnel are allowed entry. The document also includes references to the Office Security – Badge Issuance procedure and emphasizes the importance of maintaining a secure access control system.

Operations Security Policy

The Operations Security Policy outlines the measures to ensure the security, availability, and integrity of Nozomi Networks’ information assets. It covers control of critical systems, system environment control, monitoring and logging, backup and recovery, vulnerability management, and secure configuration. The policy mandates that all personnel involved with system operations adhere to documented procedures for changes, software installations, and patching. It also emphasizes the importance of segregating operational environments, enabling logging and monitoring functions, regular backups, vulnerability assessments, and implementing robust access control and network security measures. The policy is applicable to all employees and contractors.

Physical Security Policy

The Physical Security Policy ensures the physical of all Nozomi Networks offices and information processing centers. It covers designated restricted areas, physical access records, access control, equipment control, visitor control, clear desk policy, and incident management. The policy mandates that access controls are implemented and maintained, access records are kept, equipment is safeguarded, visitors are escorted, and incidents are promptly investigated and resolved. The policy is applicable to all Nozomi Networks employees and contractors.

Privacy Policy

The Privacy Policy outlines Nozomi Networks’ commitment to protecting personal information and ensuring compliance with relevant privacy laws. It covers the collection, use, and safeguarding of personal data, emphasizing principles such as data quality, purpose specification, use limitation, security safeguards, openness, individual participation, and accountability. The policy also details the rights of individuals, including the right to be informed, access, rectification, erasure, restriction of processing, data portability, objection, and rights related to automation decision-making and profiling. Overall, the policy aims to maintain transparency and build trust with stakeholders by adhering to internationally recognized standards for data protection privacy.

Quality Policy

The Quality Policy of Nozomi Networks aims to establish the company as a global leader in providing advanced solutions for protecting operational technology (OT) and industrial control systems (ICS) from cyber threats. To achieve this, Nozomi Networks has implemented a Quality Management System (QMS) in accordance with ISO 9001:2015 standards. This system ensures that processes are managed to meet the requirements of customers and stakeholders, regardless of the company’s size and footprint. All employees and contractors are responsible for adhering to the QMS and applicable laws and regulations. The company is committed to continuous improvement by setting objectives, verifying results, and applying corrective actions when necessary.

Security Incident Management Policy

The Security Incident Management Policy outlines the procedures for handling information security incidents at Nozomi Networks. It applies to all employees, contractors, systems, products, services, and any information managed by the company. The policy emphasizes the responsibility of employees and contractors to protect confidential information, report cyber threats, and participate in containment efforts. Incident management involves detections, containment, investigation, eradication, recovery, and lessons learned. The response to incidents follows documented procedures and reporting methods adhering to the NIST 800-61 standard. Confidentiality is maintained throughout the process, with senior management authorized to disclose specific information to third parties.

System Development, Acquisition, and Maintenance Policy

The System Development, Acquisition, and Maintenance Policy outlines the procedures and standards for developing, acquiring, and maintaining systems, software, and application services at Nozomi Networks. It emphasizes the inclusion of information security requirements throughout the planning, development, and deployment phases of new products, services, or systems. The policy mandates a formal development methodology aligned with industry standards such as ITIL, DevOps, and Agile, and includes phases like requirements gathering, system design, implementation, testing, deployment, operation, and maintenance. Additionally, it covers the end-of-life process for IT applications and the criteria for system acquisition, ensuring security and compliance with regulations and industry standards.

Teleworking Policy

The Teleworking Policy outlines the guidelines for employees and contractors who work from locations other than a designated Nozomi Networks office. It covers eligibility criteria, types of telework arrangements, readiness evaluation, teleworking guidelines, equipment provisions, security measures, and workers’ compensation insurance. The policy emphasizes the importance of maintaining a secure and distraction-free work environment, protecting company assets and information, and adhering to specific security protocols. It also specifies that teleworking employees are covered by workers’ compensation insurance for job-related injuries.

Access Control

Nozomi Networks ensures that users are only granted access to the network, systems, applications, and network services that they have been specifically authorized to use. Access to the system is audited, logged, and verified to maintain security and compliance.

To further reduce the risk of unauthorized access to data, Nozomi Networks' Access Control model is based on role-based access control (RBAC) to create separation of duties. The principles of least privilege are strictly enforced.

Nozomi Networks employs multi-factor authentication (MFA) for all access to systems containing client data. All employees are required to use an approved password manager. These password managers generate, store, and enter unique and complex passwords to prevent password reuse, phishing, and other password-related risks. An authentication tool is used to manage access to these accounts.

Supply Chain Management

Nozomi Networks is dedicated to maintaining a secure and reliable supply chain by continuously monitoring and assessing all sub-processors of data. We use a variety of metrics to evaluate and review the performance and compliance of our sub-processors.

As part of our operations, Nozomi Networks only partners with certified third-party sub-processors. Each vendor is thoroughly assessed through our Third Party Risk Management Program to ensure they comply with mandatory privacy regulations and adhere to best practices in security. The GRC Team conducts due diligence to evaluate each vendor's privacy, security, and confidentiality practices. This process includes executing a non-disclosure agreement to implement applicable obligations.

To ensure ongoing compliance and security, all critical suppliers are audited annually. We also utilize a vendor management platform as a central repository of information, allowing us to efficiently manage and monitor our supply chain. These measures help us maintain the highest standards of security and reliability in our operations.

Risk Management

Nozomi Networks takes a proactive approach to risk management to ensure the security and reliability of its services. Our team regularly conducts various risk assessments on the overall corporate structure, product, new projects, and proposed changes. Once a risk is identified, we follow a comprehensive process.

This structured approach allows Nozomi Networks to effectively manage and mitigate risks, ensuring the highest standards of security for our services.

Identify the Risk

We begin by identifying the risk and understanding how it relates to Nozomi Networks' services and corporation.

Evaluate the Risk

We then evaluate or rank the risk to gain a holistic view of potential exposure to the entire organization.

Treat the Risk

Based on the evaluation, we treat the risks according to the appropriate risk treatment process.

Monitor and Review

Finally, we continuously monitor and review risks to keep a close watch on all risk factors.

Data Encryption

Encryption in Transit

All communications with Vantage UI and APIs are encrypted via industry standard HTTPS/TLS (TLS 1.2 or higher).

Encryption at Rest

Service Data is encrypted at rest in AWS using AES-256 key encryption.

Application Security

Secure Code

The engineering processes used secure code principles, focusing on the OWASP Top 10 security risks.

Framework Security Controls

Nozomi Networks utilizes modern and secure open-source frameworks with built-in security controls to limit exposure to OWASP Top 10 security risks. These inherent controls help reduce the risk of SQL Injection (SQLi), Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), and other vulnerabilities.

Separate Environments

Testing and staging environments are logically separated from the production environment. No service data is used in development or test environments, maintaining a secure and controlled environment for testing purposes.

Vulnerability Management

Dynamic Vulnerability Scanning

Nozomi Networks employs third-party security tools to continuously and dynamically scan core applications against common web application security risks, including the OWASP Top 10 security risks.

Software Composition Analysis

Libraries and dependencies used in Nozomi Networks' products are scanned to identify and manage vulnerabilities, ensuring that all components are secure.

Third-Party Penetration Testing

In addition to extensive internal scanning and testing programs, Nozomi Networks engages third-party security experts to perform detailed annual penetration tests.

Data Hosting Locality

Nozomi Networks offers clients the flexibility to choose from multiple AWS datacenter locations based on their preferences and requirements.

This allows clients to select the most suitable datacenter location for their needs, ensuring optimal performance, compliance, and data sovereignty. By providing a range of options, Nozomi Networks empowers clients to make informed decisions about where their data is stored and processed, enhancing overall security and reliability.

Data Privacy

Our Commitment to Privacy

Our privacy practices are designed to protect personal information across all aspects of our operations. This includes data related to employees, job applicants, suppliers, partners, website visitors, customers, and payors. We collect personal information only for specified, explicit, and legitimate purposes, ensuring that the data is accurate, complete, and up-to-date. We implement robust technical and organizational measures to safeguard personal information against unauthorized access, disclosure, alteration, or destruction. Regular audits and reviews are conducted to maintain data quality and integrity.

Transparency and Individual Rights

Transparency is a core value at Nozomi Networks. We provide individuals with clear and accessible information about how their personal information is collected, used, and protected. Our privacy policy and notices are readily available on our website and other relevant platforms. We also empower individuals to exercise their rights under applicable privacy laws, including the right to access, correct, delete, and restrict the processing of their personal data. Our commitment to transparency ensures that our customers can trust us with their most sensitive information.

By adhering to these principles and continuously improving our privacy practices, Nozomi Networks is committed to safeguarding personal information and ensuring compliance with the highest standards of data protection.

AI Governance

AI Governance

At Nozomi Networks, we are committed to the responsible and ethical development, implementation, and use of artificial intelligence (AI) and machine learning (ML) technologies. Our AI Policy provides comprehensive guidelines to ensure that our AI/ML systems are developed and deployed in compliance with regulatory standards, including the EU AI Act. Our Program applies to all AI/ML systems embedded in our software and services, as well as any third-party AI tools used within the organization.

Our approach aligns with our goals of enabling innovation, ensuring responsible conduct, and maintaining transparency and adherence to legal and regulatory compliance requirements.

Governance and Accountability

Nozomi Networks has established a robust governance structure to oversee our AI initiatives. We have defined roles and responsibilities for the oversight of AI policy requirements, involving engineering leadership, compliance, legal, and IT departments. Review boards or committees are in place to assess AI initiatives, ensuring that all AI projects undergo thorough risk assessments and comply with evolving regulations. Such as the EU AI Act.

Our commitment to governance and accountability ensures that our AI systems operate fairly, securely, and ethically, reinforcing our dedication to maintaining the trust of our stakeholders.

Assurance

Assurance

01
ISO 27001

Nozomi Networks is ISO 27001:2022 certified. Download a copy of the certificate here.

02
SOC 2 Type II

We undergo annual comprehensive audits under the Principles of Security, Availability, and Confidentiality. SOC 2 Type II reports are available under NDA. To request the latest report, please contact your Nozomi Networks sales representative.

03
SOC 3

Download a copy of the SOC 3 report here to learn more about our security practices.

04
ISO 9001

Nozomi Networks is ISO 9001:2015 certified. Download a copy of the certificate here.

WHITE PAPER

Protecting Customer Data: Vantage SaaS Multi-tenancy

This white paper provides an overview of the Vantage data security architecture, emphasizing the importance of data protection for customers.

Download
WHITE PAPER

Security Measures for Nozomi Networks Vantage

This white paper outlines the security framework, architecture, controls, and operational procedures designed to protect Nozomi Networks Vantage, a cloud-native platform hosted on Amazon Web Services (AWS).

Download
WHITE PAPER

Compliance Assessment of Vantage IQ's Clustering Functionality in Context of the EU AI Act

This white paper presents the findings of a recent audit on the AI-based clustering functionality embedded within Nozomi Networks' Vantage IQ platform.

Download
WHITE PAPER

Managing Digital Supply Chain Risk Through Third-Party Cybersecurity Oversight

Nozomi Networks’ Third-Party Risk Management (TPRM) program is purpose-built to addresses the cybersecurity and privacy challenges of managing a complex network of SaaS and IaaS providers. 

Download
WHITE PAPER

Vantage Availability and Assurance

This white paper outlines how Nozomi Networks ensures the availability of its cloud-native SaaS platform, Vantage, in alignment with customer expectations and international standards.

Download

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.