Tenable OT Security (formerly Tenable.ot) Enterprise Manager (EM) provides an additional layer of enterprise-wide visibility and control on top of the standard functionality of Tenable OT Security. Each instance of Tenable OT Security offers full threat detection and asset management capabilities for the site at which it is deployed. The Tenable OT Security Enterprise Manager enables you to access the full functionality of all of your Tenable OT Security instances from a single application.
Tenable OT Security Functionality
Tenable OT Security protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and Active Query checks, Tenable OT Security’s ICS security capabilities maximize your operational environments visibility, security, and control.
Tenable OT Security offers comprehensive security tools and reports for IT security personnel and OT engineers. It provides visibility into converged IT/OT segments and ICS activity, and makes you aware of situations across all sites and their respective OT assets—from Windows Servers to PLC backplanes—in a single pane of glass.
Tenable OT Security has the following key features:
360-Degree Visibility — Attacks can easily propagate in an IT/OT infrastructure. With a single platform to manage and measure cyber risk across your OT and IT systems, you have complete visibility into your converged attack surface. Tenable OT Security also natively integrates with IT security and operational tools, such as your Security Information and Event Management (SIEM) solution, log management tools, next-generation firewalls, and ticketing systems. Together, this builds an ecosystem where all of your security products can work together as one to keep your environment secure.
Threat Detection and Mitigation —Tenable OT Security leverages a multi-detection engine to find high-risk events and behaviors that can impact OT operations. These engines include policy, behavioral and signature-based detection.
Asset Inventory and Active Detection — Leveraging patented technology, Tenable OT Security provides visibility into your infrastructure—not only at the network level, but down to the device level. It uses native communication protocols to query both IT and OT devices in your ICS environment in order to identify all of the activities and actions occurring across your network.
Risk-Based Vulnerability Management — Drawing on comprehensive and detailed IT and OT asset tracking capabilities, Tenable OT Security generates vulnerability and risk levels using Predictive Prioritization for each asset in your ICS network. These reports include risk-scoring and detailed insights, along with mitigation suggestions.
Configuration Control —Tenable OT Security provides a full granular history of device configuration changes over time, including specific ladder logic segments, diagnostic buffers, tag tables and more. This enables administrators to establish a backup snapshot with the “last known good state” for faster recovery and compliance with industry regulations.