ICS/OT

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments 

Nozomi Networks extends its offering with Guardian Air, a security sensor designed to help organizations detect wireless threats in OT and IoT.

Nozomi Networks extends its offering with Guardian Air, a security sensor designed to help organizations detect wireless threats in OT and IoT.

Nozomi Networks this week unveiled Guardian Air, a security sensor designed to help organizations detect wireless threats in OT and IoT environments.

Guardian Air continuously monitors widely used frequencies to provide visibility into wirelessly connected assets and detect potential threats. 

The new product can monitor frequencies typically associated with Bluetooth, cellular, Wi-Fi, Zigbee, LoRaWAN, WirelessHART, and drone RF protocols. 

The collected data is sent to Nozomi’s cloud-based management system where it can be analyzed alongside network and endpoint security data. 

Guardian Air can inform the user when an asset is wirelessly connected to the network, enabling them to detect brute-force, spoofing and hijacking attacks, while providing information on the location of the device responsible for the attack.

“Guardian Air helps keep wireless deployments secure by providing accurate visibility at the wireless level to minimize risk while maximizing resiliency. Guardian Air integrates easily into the Nozomi Networks Vantage platform, providing customers with combined network, endpoint and wireless visibility, threat and anomaly detection,” Nozomi explained. 

“Paired with our patented AI-powered analysis for real-time security management and remediation across the entire attack surface, asset owners are enabled than ever to proactively respond to security threats,” the OT and IoT cybersecurity firm added.

Guardian Air is expected to become available this spring.

Advertisement. Scroll to continue reading.

Related: New Offerings From Protect AI, Venafi Tackle Software Supply Chain Security

Related: Dragos Offering Free OT Cybersecurity Technology to Small US Utilities

Related: MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure

Related Content

ICS/OT

Government agencies are sharing recommendations following attacks claimed by pro-Russian hacktivists on ICS/OT systems.

ICS/OT

An analysis conducted by Honeywell shows that much of the USB-borne malware targeting industrial organizations can still cause OT disruption.

ICS/OT

Palo Alto Networks firewall vulnerability CVE-2024-3400, exploited as a zero-day, impacts a Siemens industrial product.

Nation-State

Mandiant summarizes some of the latest operations of Russia’s notorious Sandworm group, which it now tracks as APT44.

IoT Security

Many LG TVs may be vulnerable to remote hacking due to a series of vulnerabilities found by Bitdefender researchers.

ICS/OT

In the past week Rockwell Automation addressed 10 vulnerabilities found in its FactoryTalk, PowerFlex and Arena Simulation products.

Malware & Threats

A suspicious NuGet package likely targets developers working with technology from Chinese firm Bozhon.

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version