Story image

Tenable solution secures converged IT/OT environments

28 Feb 2019

Tenable has announced a Cyber Exposure solution to provide a unified view of cyber risk spanning information technology (IT) networks and operational technology (OT), from enterprise applications to industrial control systems.

This allows security leaders to use a single platform to measure, manage and reduce cyber risk across both IT and OT environments with Tenable Industrial Security which is integrated with Tenable.sc (formerly SecurityCenter) for vulnerability management on-premises.

Digital transformation means that the days of fully air-gapped OT assets are largely gone.

Modern OT environments increasingly interconnect with IT, resulting in a complex, sensitive and expanded attack surface.

As effective risk management is built on a unified understanding of the entire IT/OT attack surface, organisations are shifting responsibility for OT security to the Chief Information Security Officer (CISO).

Yet traditional IT security solutions lack the ability to continuously discover and assess sensitive OT assets.

Conversely, most OT security solutions don’t translate to the world of IT.

This lack of holistic visibility creates security blind spots and increases the chances of mission- and safety-critical systems being compromised or taken offline.

An attack on a high-value OT asset, for example, may begin by compromising a traditional IT asset and then moving laterally.

When used with Industrial Security, Tenable.sc aims to solve this problem by delivering clarity into an organisation’s converged IT/OT environments. Tenable.sc leverages Nessus scanners to gather security-related information from IT-based assets on OT and IT networks.

Tenable.sc combines that information with passively collected asset and vulnerability data from Industrial Security, which provides asset discovery and vulnerability management purpose-built for OT environments.

Designed for critical systems that require a non-intrusive approach to vulnerability management, Industrial Security is an OT-native solution that helps identify and prioritise OT risks so organisations can keep safety-critical production assets secure and fully functional.

The integration of Tenable.sc and Industrial Security provides a complete picture of IT and OT assets together, identifying exposures and vulnerabilities across the entire enterprise and helping organisations prioritise and manage cybersecurity against business risk.

Additional enhancements to the Tenable.sc and Industrial Security integrated solution include:

  • Integration with Tenable Cyber Exposure Technology Ecosystem to improve remediation and response processes for both IT and OT environments. Tenable’s market-leading integration partners span Security and IT technologies, including industry-leading SIEM, IT Ticketing and Configuration Management Database (CMDB) solutions. Together, these solutions accelerate the time-to-detect and remediate issues through a greater breadth of visibility across the modern attack surface, depth of analytics, and integrated data and workflows, fostering better collaboration across Security and IT Operations teams.

  • Expanded OT asset coverage which includes wider and deeper coverage of several thousand new devices from leading industrial manufacturers, such as Yokogawa and Emerson. These new manufacturers join the top 10 leading industrial manufacturers — including Siemens, Schneider, Rockwell/Allen-Bradley, Honeywell, Mitsubishi and others — whose devices are already covered by Industrial Security.

Tenable co-founder and chief technology officer Renaud Deraison says, “The interconnectedness of digital infrastructure today means the security of IT directly impacts OT, and vice versa.

“Without a single, unified view into converged IT/OT environments, CISOs are basically being asked to defend their organisations blindfolded and with one arm tied behind their backs, he says.   

“It’s bad cyber strategy and it places the business at serious risk.”

Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.