Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

3/16/2021
06:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tempered Combines Strengths With Nozomi Networks to Deliver Industry-Leading IoT/OT Security

Solution integration offers AI-powered threat visibility, analysis and remediation along with military-grade encryption, policy enforcement and simplified policy management.

Seattle, WA and San Francisco, CA | March 16, 2021 08:00 AM Eastern Daylight Time

Tempered Networks and Nozomi Networks today announced a new partnership and product integration to deliver a full-featured industrial security solution for network visibility, threat detection and remediation. The joint offering integrates Nozomi Networks’ leading network visibility, threat detection and incident response system with Tempered Network’s Zero Trust policy enforcement and centralized software-defined perimeter management console. Today’s sophisticated security threats are driving requirements for not only extreme visibility and intelligent threat detection, but also automated remediation that can lock-down vulnerable systems while ensuring continued availability for authorized access and continuity of business.

“As the leader in OT and IoT security visibility and threat detection, Nozomi Networks gives us a powerful partner to deliver greater insight and remediation capabilities to our customers,” said Jeff Hussey, Founder and CEO of Tempered Networks. “The AI-powered network analysis and anomaly detection that they provide can drive more accurate micro-segmentation and security policy enforcement into our Airwall platform, providing a more secure, rapid response approach against industrial-grade network attacks.”

“Tempered Airwall delivers the military-grade encryption and secure access policy enforcement that many of our joint customers rely upon to quickly remediate anomalies and threats in their networks,” said Chet Namboodri, Nozomi Networks Senior Vice President of Business Development and Alliances. “The combination of threat visibility and automated enforcement significantly improves security response. Ubiquitous threats like the SolarWinds attack continue to emerge and industrial connectivity for remote work and connected smart devices continue to accelerate. Our combined offerings provide strong detection and defense against the rapid proliferation of advanced persistent threats, actively buttoning down attack surfaces.”

The product integration includes the ability of Tempered to mirror secure traffic to Nozomi Networks solutions through a fully encrypted overlay for greater analysis and insight. Armed with AI-driven insights from Nozomi Networks, Airwall customers can take remediation steps or refine Tempered security policies through the Airwall Conductor management console API. The Nozomi Networks solution and Tempered Networks Conductor work in concert to refine Airwall zero trust policies and address identified threats, going beyond the capabilities of traditional network security devices like firewalls or remote access solutions.

"A two-way integration of network monitoring of IoT devices and secure, zero-trust, communications is brilliant," said Richard Stiennon, industry analyst with IT-Harvest and author of Security Yearbook 2020. "Ensuring that all communications is stealthed and encrypted while preserving visibility into traffic is a winning combination."

The joint solution is available today with the release of Tempered Networks Airwall 2.2.11. Contact the respective vendors for platform pricing details.

 
About Tempered Networks
Tempered makes the industry’s only truly native Zero Trust Software-Defined Perimeter (SDP) solution. Airwall is the modern air gap for all connected things. Airwall makes it easy to create and maintain hyper-secure networks across complex infrastructure anywhere, including IT/OT/ICS/SCADA, remote and in the cloud. Airwall networks are multi-factor authenticated, micro-segmented, encrypted end-to-end, and impervious to lateral movement. Ready to make your company’s critical assets and infrastructure invisible to threats? Visit https://tempered.io.
 
About Nozomi Networks
Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-2322
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
CVE-2021-20019
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
CVE-2021-21809
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
CVE-2021-34067
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
CVE-2021-34068
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.