Industrial Defender Teams With Nozomi Networks To Strengthen Endpoint Security Capabilities In Industrial Environments

Industrial Defender Teams With Nozomi Networks To Strengthen Endpoint Security Capabilities In Industrial Environments

Global leaders in OT and industrial cybersecurity Nozomi Networks and Industrial Defender today announced a strategic partnership to enhance the security of critical infrastructure and manufacturing facilities. The companies’ joint solution combines asset visibility and threat detection capabilities from Nozomi Networks with change and configuration monitoring from Industrial Defender to provide the most complete and detailed view of OT assets and behavior in the industry.

“Collaborating with industry leaders is essential for effectively defending against the growing cyber threats against operational technology. That’s why we’re proud to partner with Nozomi Networks, the leading asset visibility and threat detection platform for OT and IoT environments,” said Jay Williams, CEO of Industrial Defender. “Our combined solution enables end users to gain a more complete view of asset activity and behavior, as well as better diagnose potential threats for manufacturers, power utilities, oil and gas, and other critical infrastructure operators.”

“The partnership between Industrial Defender and Nozomi Networks empowers industrial operators to gain valuable insight to detect anomalies and improve their overall security posture,” said Edgard Capdevielle, CEO of Nozomi Networks. “With our combined capabilities, asset owners and operators benefit from a full view of their OT environment, enhanced with deeper asset data provided through Industrial Defender’s endpoint configuration management capabilities.”

Also Read: Top Four Reasons to Adopt CIEM in Cloud Security Strategy

The joint solution delivers:

  • Active, agentless, and passive data collection methods for asset information including OS details, software installed, patches, open network ports, firewall rules, user accounts, and NICsComprehensive and centralized view of asset inventory, vulnerability database, process variables, and threat detection data
  • Change monitoring capabilities that automatically collect, normalize, and report changes in the OT environment based on configuration baselines
  • Automated policy assessments and reports for standards such as NIST CSF, NERC CIP, and ISA/IEC 62443
  • Visibility and threat detection across connected and disconnected devices

With these capabilities, operators gain the ability to identify, monitor, and analyze every asset in the OT infrastructure to mitigate security and operational risk.

For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.