Recently Viewed Topics
Introduction to Waterfall
Tenable Network Security’s Nessus Network Monitor (NNMNessus Network Monitor) provides continuous visibility into the systems and services running on your networks, for unmatched asset insight. From legacy assets to the latest technologies, and from IT to OT, it illuminates blind spots so you can see and protect your entire environment. The Nessus Network Monitor offers enhanced OT support, including asset discovery and protocol detection, for passively monitoring industrial control systems (ICS), SCADA systems, and other operational technology. This gives security teams a safe and non-intrusive way to discover and monitor sensitive critical infrastructure systems. The Nessus Network Monitor also detects new and unmanaged assets – spanning operating systems, network devices, hypervisors, databases, mobile devices, web servers, cloud applications, IoT devices, critical infrastructure such as ICS / SCADA, and more.
Waterfall Security Solutions produces a wide spectrum of solutions based on and complementing Waterfall’s world-leading Unidirectional Security Gateways. Waterfall Unidirectional Security Gateways replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from attacks originating on external networks. Unidirectional Gateway solutions come in pairs: the TX appliance contains a laser, and the RX appliance contains an optical receiver. The Gateway pair transmits information out of an operations network, but is incapable of propagating any virus, DOS attack, human error or any information at all back into the protected network. By seamlessly connecting to the data source and replicating it on the other side, Waterfall’s Unidirectional Security Gateways provide access to real-time data, without introducing threats to operations networks which accompany firewall connections.
By integrating Waterfall’s Unidirectional Security Gateway with Tenable Network Security’s Nessus Network Monitor, customers can deploy their vulnerability management solution on the IT side of their infrastructure and get unparalleled visibility into both their IT and OT infrastructure.