Suitable for water supply utilities OT security solutions
OT network security management of drinking water and wastewater treatment facilities
Water purification and wastewater treatment plants is a key infrastructure, because safety and clean water is critical to public health.These legacy systems are generally not safe, at the right moment is the attacker's high value targets.As a result, the new federal regulations come on stage, then requires water treatment plants a comprehensive understanding of its mixed IT/OT/IoT environment.Tenable OT Security(原名 Tenable.ot)为关键基础设施环境提供了量身定制的一流风险暴露管理能力。
Apply for demo![供水工业解决方案 The water supply industry solutions](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/water-solution-hero.png)
The important industrial water supply infrastructure security
Water purification and wastewater treatment operations more and more intelligent, interconnected and digital.Improve the water supply plant operation needed to use technological progress depends on improving interconnectivity and automation.Interconnected network in creating huge efficiency at the same time, also produced a broader attack surface, put your business at a higher risk.Federal compliance requirements and, therefore, the government funding for network security complete degree be forthcoming.
Read the following about the water sector compliance with federal funding for more information:
Download solution outline public water treatment systemComplete visibility of water infrastructure and operation
Water supply facilities include a number of different industrial operations.Each process requires complex choreography, including IT and OT operation work together.Therefore, the enterprise needs to environment with complete fusion, the isolated view.This includes network level of visibility to identify problems or abnormal flow, and can find IT and infected OT equipment level of visibility of the equipment.
readingUse case.
![供水基础设施和作业的完整可见性 A complete visibility water infrastructure and operation](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/complte-visivbility.jpg)
Active attack vector
Centralized, independent operation of drinking water treatment plant (DWTP) to replace the originally fragmented process management operations of the wastewater treatment plant (WWTP) decisions more and more automated, must have in-depth understanding and knowledge of system operation, to prevent the happening of the security incident
Use attack vector to find weaknesses of OT environment actively, identify the weakness would be used to attack or attackers were used.Using the combination of powerful threat detection engine to find more threat, regardless of the source, the engine will alert potential security events.
Watch the on-demand webinar:Let the cat out of the analysis- about the recent attacks on water supply infrastructure, and we can learn from this lesson.
![主动阻断攻击载体 Active attack vector](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/compelte-visibility.jpg)
Inventory and tracking assets
Water supply facilities often have large infrastructure.A lot of different equipment distribution in wide area, sometimes even across multiple networks.In addition to the brands and models of different, usually how generation equipment in the network.OT found solutions should be able to combine a variety of methods, create the latest assets list for the distributed environment.
Reading aboutAWIA complianceFor more information.
![盘点和追踪资产 Inventory and tracking assets](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/identify-and-score.jpg)
Identify weaknesses and to rate
Because the DWTP and WWTP has "always open" requirement, in the found vulnerability, it's hard to stop to perform routine maintenance fixes or application.
You should before the attacker exploit the initiative to find and fix bugs.Using the asset tracking ability, comprehensive and detailed Tenable OT Security passBug priority rating (VPR)Generate related threat rating and classification list.This, according to the specific equipment for your environment, and so you will know what equipment should first repair.
![识别漏洞并进行评分 Identify weaknesses and to rate](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/inventory.jpg)
Understand the change of time
Configuration control malicious software and the user can be traced to the network or changes to the equipment to perform directly.It can provide the equipment configuration complete change history records over time.It can make the administrator snapshot backup is used to establish "in a good condition after confirmation", faster recovery and compliance with industry regulations.
Reading about configuration controlThe white paper.
![了解更改时间 Understand the change of time](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/PROACTIVELY-MANAGE.jpg)
Provides the Tenable OT Security solutions
Speed and efficiency
Whatever your SCADA environment scale and complexity, automation assets found that are "necessary".Tenable OT Security能自动收集与显示大量数据,而这些数据可能需要您的团队以人工方式花费数周时间才能获取。 Tenable OT Security 能持续实时提供可见性和深度的详细信息。
With a powerful security situational awareness
Tenable OT the mixture of Security detection engine can provide the necessary safety equipment and network level.While using powerful asset listing may at any time to understand what environment is the assets, both floor and ladder logic, can master all.
Compliance and expert support
Using detailed audit tracking plus Tenable engineer support, you can work quickly, and get you all the necessary data, to meet the prescribed requirements, and maintain the operation of the entire industry complete visibility and control.
Related products
Check the Tenable OT the Security
The practical application of
"We chose the Tenable is took a fancy to its unique monitoring, active detection and remind ability, can alert employees arising in the course of industrial control system may affect the integrity and normal operation of any changes."Raleigh SCADA security manager Steve Worley