sb-nz logo
Story image

Tenable solution secures converged IT/OT environments

28 Feb 2019

Tenable has announced a Cyber Exposure solution to provide a unified view of cyber risk spanning information technology (IT) networks and operational technology (OT), from enterprise applications to industrial control systems.

This allows security leaders to use a single platform to measure, manage and reduce cyber risk across both IT and OT environments with Tenable Industrial Security which is integrated with Tenable.sc (formerly SecurityCenter) for vulnerability management on-premises.

Digital transformation means that the days of fully air-gapped OT assets are largely gone.

Modern OT environments increasingly interconnect with IT, resulting in a complex, sensitive and expanded attack surface.

As effective risk management is built on a unified understanding of the entire IT/OT attack surface, organisations are shifting responsibility for OT security to the Chief Information Security Officer (CISO).

Yet traditional IT security solutions lack the ability to continuously discover and assess sensitive OT assets.

Conversely, most OT security solutions don’t translate to the world of IT.

This lack of holistic visibility creates security blind spots and increases the chances of mission- and safety-critical systems being compromised or taken offline.

An attack on a high-value OT asset, for example, may begin by compromising a traditional IT asset and then moving laterally.

When used with Industrial Security, Tenable.sc aims to solve this problem by delivering clarity into an organisation’s converged IT/OT environments. Tenable.sc leverages Nessus scanners to gather security-related information from IT-based assets on OT and IT networks.

Tenable.sc combines that information with passively collected asset and vulnerability data from Industrial Security, which provides asset discovery and vulnerability management purpose-built for OT environments.

Designed for critical systems that require a non-intrusive approach to vulnerability management, Industrial Security is an OT-native solution that helps identify and prioritise OT risks so organisations can keep safety-critical production assets secure and fully functional.

The integration of Tenable.sc and Industrial Security provides a complete picture of IT and OT assets together, identifying exposures and vulnerabilities across the entire enterprise and helping organisations prioritise and manage cybersecurity against business risk.

Additional enhancements to the Tenable.sc and Industrial Security integrated solution include:

  • Integration with Tenable Cyber Exposure Technology Ecosystem to improve remediation and response processes for both IT and OT environments. Tenable’s market-leading integration partners span Security and IT technologies, including industry-leading SIEM, IT Ticketing and Configuration Management Database (CMDB) solutions. Together, these solutions accelerate the time-to-detect and remediate issues through a greater breadth of visibility across the modern attack surface, depth of analytics, and integrated data and workflows, fostering better collaboration across Security and IT Operations teams.

  • Expanded OT asset coverage which includes wider and deeper coverage of several thousand new devices from leading industrial manufacturers, such as Yokogawa and Emerson. These new manufacturers join the top 10 leading industrial manufacturers — including Siemens, Schneider, Rockwell/Allen-Bradley, Honeywell, Mitsubishi and others — whose devices are already covered by Industrial Security.

Tenable co-founder and chief technology officer Renaud Deraison says, “The interconnectedness of digital infrastructure today means the security of IT directly impacts OT, and vice versa.

“Without a single, unified view into converged IT/OT environments, CISOs are basically being asked to defend their organisations blindfolded and with one arm tied behind their backs, he says.   

“It’s bad cyber strategy and it places the business at serious risk.”

Story image
Cloud services top threat vector for healthcare industry
"The coronavirus pandemic continues to highlight the unique cybersecurity needs of the healthcare industry, even as it has increased the number of threats these organisations face."More
Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More
Story image
Software-based facial recognition in payments industry to dominate by 2025
There will be more than 1.4 billion users of facial recognition software used for payments alone in 2025, up from 671 million in 2020.More
Story image
Ransomware and Microsoft Exchange attacks surging 
There are global surges in ransomware attacks alongside increases in cyber attacks targeting Microsoft Exchange Server vulnerabilities, according to Check Point Research.More