Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments 

Nozomi Networks extends its offering with Guardian Air, a security sensor designed to help organizations detect wireless threats in OT and IoT.

Nozomi Networks this week unveiled Guardian Air, a security sensor designed to help organizations detect wireless threats in OT and IoT environments.

Guardian Air continuously monitors widely used frequencies to provide visibility into wirelessly connected assets and detect potential threats. 

The new product can monitor frequencies typically associated with Bluetooth, cellular, Wi-Fi, Zigbee, LoRaWAN, WirelessHART, and drone RF protocols. 

The collected data is sent to Nozomi’s cloud-based management system where it can be analyzed alongside network and endpoint security data. 

Guardian Air can inform the user when an asset is wirelessly connected to the network, enabling them to detect brute-force, spoofing and hijacking attacks, while providing information on the location of the device responsible for the attack.

“Guardian Air helps keep wireless deployments secure by providing accurate visibility at the wireless level to minimize risk while maximizing resiliency. Guardian Air integrates easily into the Nozomi Networks Vantage platform, providing customers with combined network, endpoint and wireless visibility, threat and anomaly detection,” Nozomi explained. 

“Paired with our patented AI-powered analysis for real-time security management and remediation across the entire attack surface, asset owners are enabled than ever to proactively respond to security threats,” the OT and IoT cybersecurity firm added.

Guardian Air is expected to become available this spring.

Advertisement. Scroll to continue reading.

Related: New Offerings From Protect AI, Venafi Tackle Software Supply Chain Security

Related: Dragos Offering Free OT Cybersecurity Technology to Small US Utilities

Related: MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.

IoT Security

An innocent-looking portable speaker can hide a hacking device that launches CAN injection attacks, which have been used to steal cars.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...