Suitable for NERC compliance solution
Protect the power infrastructure from OT security threats
For details![遵守 NERC 要求 Abide by the NERC requirements](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/solutions/Tenable-Solution-Hero2.png)
Network threats continue to aggravate constantly brings to the national important infrastructure risks
Power and power grid suppliers must take measures to protect themselves, but also need to abide by the NERC CIP (north American electric reliability corporation - critical infrastructure protection) standard.NERC CIP includes a series of designed to maintain and improve the reliability of the large-scale power system (BES) standards.CIP aims to protect such important infrastructure components required for reliable operation of the system.
Tenable OT SecurityOT and SCADA networks through continuous monitoring of whether there is a compliance and security vulnerabilities, threats and problems, so as to provide visibility for power grid and electric, safety and control functions, and to ensure the security and reliability of the BES and other assets.
Reading aboutHow Tenable OT Security help to abide by the NERC CIPFor more information.
NERC CIP compliance maintenance solution
Tenable OT industrial network Security to protect against cyber threats, malicious insiders and human error.Tenable ICS security function can identify the threats and vulnerabilities, and carries on the forecast analysis of priority, in order to maximize OT the security and reliability of the environment.
360 degrees of visibility
Provide visibility on fusion against the 360 degrees, at the same time across the OT and IT can also measure and control system of network security risk.
Threat detection and mitigation
Identify operating in violation of the policy, abnormal behavior and track characteristics of potential risk events.
Adaptive assessment
Provide deep insight about the infrastructure and incomparable situational awareness, and will not affect the operation.
Based on the vulnerability management of risk
VPR rating determines the level of vulnerability and risk of each asset, and its mitigation measures are suggested.
Configuration control
Configuration control - device configuration change over time of complete historical records.This allows administrators to create a "on a state after confirmation of good" snapshot backup.
Check the Tenable OT the Security
The practical application of
"We further study of the various solutions.Of course is Tenable."Matt Ramberg Sanmina, vice President of information security department