Tenable, Inc., has announced a new solution designed to reduce cyber security risk across today’s converged IT/OT environments. Enhancements to the Tenable.io platform and Industrial Security enable organizations to manage cyber exposure holistically across IT and OT and effectively prioritize remediation based on the criticality of the asset and the vulnerability.
OT and critical infrastructure systems were initially designed to work in isolation from the network and walled off from outside cyber security threats. But digital transformation has turned these once-isolated systems into connected devices, making them high value targets for attackers. In fact, attacks on OT assets often start by compromising IT systems and then moving laterally. Converged environments contain a mix of IT and OT devices and systems that demand a holistic approach to cybersecurity so that organizations can accurately manage, measure and reduce cybersecurity risk.
- Smart scanning: smart scanning builds an intelligence layer on top of active scanning and passive network monitoring to assess IT and OT systems within a single workflow. In certain situations, active scanning may be too intrusive for sensitive OT systems and can cause system disruption if performed on these devices. Smart scanning will stop actively scanning IT assets when it identifies them as OT devices.
- Expanded OT asset coverage: Tenable has expanded its assessment capabilities across an even broader range of OT assets. Expanded support includes over 250 additional devices and applications from Siemens, Schneider and Rockwell/Allen-Bradley, providing customers with broader visibility across their OT assets and mixed IT/OT technology environments.
- Interactive topology maps: new 2D and 3D topology maps display the relationships between IT and OT assets as part of a converged system. This new level of IT and OT asset intelligence combined with Tenable’s deep vulnerability intelligence provide customers with a risk-based heat map based on the criticality of the asset and the vulnerability, enabling more efficient prioritization and faster remediation.