オペレーショナルテクノロジー (OT) のセキュリティ: コンバージド IT/OT 環境のサイバーリスクの低減方法
IT と OT に存在するサイバーセキュリティのサイロを取り除いて脅威を検出し、潜在的な攻撃を阻止するには
オペレーショナルテクノロジー (OT) は、1960 年代後半以来、製造業や電力、ガス、水道事業をはじめとする産業界の一部となっています。 最近までほとんどの OT デバイスは外部ネットワークに接続されていなかったため、ユーザーは、OT 環境は攻撃に対して「安全」であると考えていました。
However, in today’s modern industrial and manufacturing facilities, air-gapping is no longer effective, increasing the likelihood of cyberattacks.

製造業の垂直および重要インフラ環境に悪影響を与える、想定されるほぼすべての攻撃事例が文書化されています。- 「ホワイトペーパー: OT 攻撃を予測する」
In manufacturing, for example, OT assets are used in both discrete manufacturing such as automobile production and the pharmaceutical industry, and continuous manufacturing such as water purification and oil production. In these settings, programmable logic controllers (PLCs) or distributed control systems (DCSs) control OT devices
Historically, these devices were physically separated from networks through air-gapping, a security measure to prevent OT devices from connecting to anything else or being exposed to the outside world.
しかし、OT デバイスと IT デバイスのコンバージェンスが進み、IIoT (産業用のモノのインターネット) への依存度が高まっている現在、OT 環境の安全を維持するには、エアギャップではもはや不十分となっています。
Now, a cyberattack that begins in an IT network can easily traverse into an unsecured OT environment, pushing cybersecurity teams to give OT environments increased attention.
This knowledge base outlines OT cybersecurity challenges and solutions to create a better understanding of OT-related cyber risks and provides recommendations about how to keep your organization safe in this ever-changing and rapidly evolving converged IT and OT world.
レポートの内容
最新の OT 環境のための産業用サイバーセキュリティ
IT と OT のコンバージェンスが進むにつれ、産業界のサイバーセキュリティに新たな課題とリスクが生じています。 Take a closer look at these challenges and how to mitigate OT security threats.
詳細はこちらからTenable Connect community for operational technology
オペレーショナルテクノロジーのサイバーセキュリティを維持するために必要なことは、従来の IT セキュリティの場合とは異なります。 お困りのことはありませんか? Tenable Connect is the No.1 place to talk about OT, ask questions and share tips.
詳細はこちらからFrequently Asked OT Questions
Do you have questions about industrial cybersecurity, operational technology or how to keep your OT environment secure? まずよくあるご質問をご覧ください。
詳細はこちらからHow to Choose the Right OT Security Solution
OT セキュリティソリューションの購入をご検討中ですか? どこから始めればよいか迷っている、または最適なソリューションがわからないということはありませんか? 以下の 6 つの基本となる質問をご確認ください。
詳細はこちらからEnd-to End OT Visibility and Other OT Blogs
End-to-end visibility and risk prioritization for all assets are key to securing your converged IT/OT environment. Learn more about the role of exposure management and other important topics in these OT blogs.
詳細はこちらからOT に関する 2 分間のクイックヒント
2 分間、お時間がありますか? In these videos, learn more about automated OT asset discovery, industrial control planes, industrial controllers and more, all in just two minutes.
詳細はこちらからTenable OT Security: IT/OT 統合セキュリティ
サイバー脅威、悪意ある内部関係者、ヒューマンエラーから産業界のネットワークを保護
Tenable OT Security can help you identify threats and predictively prioritize cybersecurity risks and other security vulnerabilities to maximize the safety and reliability of your modern OT environment.
Tenable OT Security で実現できること
- コンバージドアタックサーフェスの包括的な可視化を実現
- OT 環境に影響を与えるリスクの高いイベントやアクティビティを検出する、マルチ検出エンジン
- ネットワークから個々のデバイスのレベルに至るまで、インフラ全体の可視化を実現
- Predictive Prioritization for every asset in your ICS network so you can find vulnerabilities and understand risk level
- ネットワーク全体または特定のデバイス上で、ユーザーベースの変更やマルウェアを追跡可能
OT 環境のための産業用サイバーセキュリティ
産業における運用および重要インフラへの攻撃は、産業用コントローラーに集中しています。So, how do you keep your ever-expanding attack surface safe?
Tenable OT Security offers a comprehensive security solution for IT and OT security. It can help protect your industrial networks from threats, malicious insiders and other risks with capabilities such as:
- コンバージド IT/OT 環境と産業用制御システム (ICS) のアクティビティに対する 360 度の可視性
- 企業の脅威となる高リスクのイベントを検出するマルチ検出エンジン
- ポリシー違反やネットワークトラフィックのベースライン逸脱を検出する自動アラート機能
- クラウドソーシングデータを使用して新しい攻撃を検出するシグネチャ更新
- ネットワークと OT デバイスに対する脅威を検出する、パッシブ検出とアクティブクエリ (特許取得済み)
- 脆弱性の優先順位付けとメンテナンス計画の策定に役立つ、リスクデータの最新かつ詳細なインベントリリスト
- プログラマブルロジックコントローラー (PLS)、分散制御システム (DCS)、ヒューマンマシンインターフェース (HMI) などの OT 資産について、変更に関するレポートの作成機能を備えた構成管理
落とし穴に注意! A Roadmap for IT/OT Alignment
OT 環境では接続される OT デバイスの数が増加しており、これにより、産業用ネットワークのセキュリティに新たな課題が発生しています。 Air-gaps alone are no longer effective because today's industrial attack surface now encompasses both IT and OT. This makes lateral attacks a growing threat. If attackers find a weak link on either side, they can use it as a gateway into your entire organization, quickly gaining access to both information and operations.
An integrated IT/OT security strategy can detect attacks earlier and help your team more effectively identify, investigate and address vulnerabilities and threats across your attack surface.
This white paper explores:- How OT and IT are increasingly converging
- What’s happening in your expanding attack surface and attack vectors
- Issues contributing to a disconnect between IT and OT security practices
- Security and compliance best practices for industrial networks
- Benefits of a converged IT/OT security strategy
Accidental Convergence: A Guide to Secured IT/OT Operations
重要インフラと産業用環境において、オペレーショナルテクノロジーは重要な役割を担っています。 In addition to routers, servers, computers and switches used in traditional IT environments, to operate plants and factories, industries also use OT devices such as distributed control systems (DCSs), programmable logic controllers (PLCs), and human-machine interfaces (HMIs).
While threats that begin in IT can laterally move into your OT environment, OT threats aren’t necessarily the same as IT security risks. そのため、OT 環境を保護するには、異なるセキュリティツールや運用ポリシーが必要になります。
This white paper explores:
- IT/OT コンバージェンスの促進要因
- Why air-gapping OT systems is not effective
- 偶発的なコンバージェンスの概要とその影響
- システムへの侵入を狙う攻撃者
- How you can plan ahead for OT security including more visibility, better situational analysis and reduction of cyber risk
自動化された OT 資産の検出と管理における上位3つのユースケース
Most ICS networks lack basic security controls and the ability to automatically manage assets like you’d find in more traditional IT environments.
産業用制御システムネットワークへの攻撃が増えている理由は、攻撃者がこの点を把握しているからです。
As your organization looks for ways to defend your ICS systems, automated asset discovery and automated asset management are critical. If you don’t have an up-to-date and accurate ICS asset inventory, you can’t effectively manage OT risks. If you don’t know your risks, you can’t secure your environment.
As your ICS network grows and your IT and OT networks continue to evolve, effective asset management is an increasingly important component of your overall cybersecurity strategy.
This white paper explores:
- Incident response strategies
- How to decrease resolution time and ensure operational continuity
- Compliance with key industry regulations
Critical Infrastructure Cybersecurity: Actively Secure Your Industrial Environment in the New Era of Distrust
Within your industrial control system environment, if you’re using network monitoring only, you may miss a device attack. Network monitoring only gives you about 50% visibility into your converged IT/OT environment and those blind spots put you at risk for being infected for days — or even months — without your knowledge.
Effective OT cybersecurity is more than network monitoring. By adding device-based security measures to your exposure management program, you’ll have better situational awareness about your actual cyber risks so you can plan remediation and defense strategies accordingly.
This white paper explores how to:
- Improve controller integrity by quickly discovering device changes made through physical connections
- ネットワーク通信を行わない資産も含めた、資産の検出方法
- 「最新の既知の正常な状態」のデータを維持して、包括的なバックアップと復旧の戦略を実現する方法
- ネットワークのルーティング可能なすべてのコンポーネントを監視する方法
Tenable Connect Community: Your go-to resource for OT
The Tenable Connect community is a place to share common interests in OT security and exchange ideas. Tenable Connect is a great resource to help you make the most of your Tenable products and access fresh ideas about how to keep your OT environment secure.
Avoid Scanning Fragile Devices
There are many fragile devices on each network that cannot be included in active scanning, due to the sensitive nature of such devices. Operational Technology (OT) is the most common category of sensitive devices.
続きを読むSecuring Operational Technology from Cyberattacks
Threat actors are increasing attacks on water and wastewater systems (WWS). These attractive OT targets are complex to protect.
続きを読む3 Ways to Handle Insider Threats in OT Infrastructure
With blurred lines between IT and OT, the newest threat may come from where you least expect it — inside your organization.
続きを読むOT セキュリティソリューションを選択する際に考慮すべき 6 つの質問
When it’s time to choose an OT cybersecurity solution, you want to know if you’re choosing one that meets all of your organization’s unique and specific requirements and if it’s flexible and scalable for future requirements you may have.
To reduce exposures in your OT environment, the solution you choose should support your specific OT devices, including non-disruptive asset discovery (even in older network assets), alerts on critical vulnerabilities, and support for secure OT/IT alignment.
Knowing the right questions to ask upfront can prevent future headaches and ensure you choose the best solution to secure your OT and IT environments. Here are six important questions to consider when evaluating OT security solutions:
-
ベンダー非依存か?
ソリューションは、使用するすべてのプロトコルとデバイスに対応する必要があります。
-
マルチ検出方式を備えているか?
The solution should provide coverage both to the network and devices on the network.
-
既知の CVE (Common Vulnerabilities and Exposures) を検出してアラートを通知するか?
既知の CVE を検出する機能をセキュリティポリシーに組み込めるプラットフォームであれば、より迅速な検出が可能です。
-
OT だけでなく、IT にも対応するか?
The solution should work in conjunction with your already-deployed IT security products such as your security information event management (SIEM) tool, next-generation firewalls (NGFWs) and diode-based firewalls.
-
保護された IT/OT アラインメントに対応しているか?
環境ごとに専用のソリューションを使用する必要があります。
-
ハードウェアや動作環境の観点から、OT 環境で動作するように設計されているか?
ソリューションは、使用するネットワークや物理アーキテクチャの要件に合わせて構成可能である必要があります。
OT セキュリティに影響を与えるトレンド
Whether intentional or accidental, there are several trends increasing attack vectors across OT environments. Here are some common OT trends and how they can impact your organization:
-
意図的な IT/OT コンバージェンス
By uniting IT and OT and eliminating siloed infrastructures, you may reduce costs and improve operational efficiencies.
-
偶発的な IT/OT コンバージェンス
If your organization doesn’t have a convergence strategy, but your employees use IT assets (such as laptops, thumb drives etc.) in OT environments, it can inadvertently create an accidental IT/OT convergence that increases organizational risks.
-
Industry 4.0
Industry 4.0 includes the introduction of IoT tech used to monitor and/or control OT environments and/or assets.
-
コラボレーションの増加
IT and OT teams are collaborating with each other more than ever before. Information and expertise silos are beginning to come down and, in some cases, IT and OT function on the same team.
Because today's cybercriminals can attack from all sides — and attacks laterally creep across IT to OT and vice versa — keep an eye on these trends to ensure comprehensive OT security.
OT 環境全体に対する卓越した状況認識を提供
Tenable OT Security protects your industrial network from malicious insiders, cyber threats and human error. The solution provides deep situational awareness about all the threats that put your OT network at risk so you can maximize the visibility, security and control of your operational technology environment.
Tenable OT Security ブログ記事

回復力に優れる OT 環境の構築: 電力供給に関する保護措置
One in 10 cyberattacks around the world in 2022 targeted energy organizations, making it the fourth most-attacked industry. With this growing number of attacks on critical infrastructure, it's important to understand how attackers can take advantage of industrial control systems and the role vulnerability management best practice plays in reducing risk, mitigating damage and preventing the shutdown of essential services.

OT セキュリティの課題に取り組む: 資産インベントリと脆弱性評価
With the convergence of IT and OT devices in industrial environments, comprehensive asset discovery and vulnerability identification and remediation is complex and challenging. In many environments, most OT systems are legacy, customized, or proprietary, which increases cyber threats and complicates mitigation. Responsive and accurate vulnerability detection requires active monitoring and querying of all of your OT devices.

国防総省における OT:安全かつ効率的な電力網の確保に対する取り組み
To uphold its national defense mission, the U.S. Department of Defense depends on critical infrastructure to manage everything from illuminating command centers to fueling advanced weapons systems. At the heart of this infrastructure are OT devices, including the hardware and software necessary to monitor and control physical processes and systems like the power grid. Unfortunately, the power grid is vulnerable to cyberattacks, and the consequences of an attack could be dire.

国防総省の生産ラインにおける OT セキュリティ対策
Operational technology has a direct impact on the Department of Defense's manufacturing lines and can play a vital role in improving supply chain management and logistics. As DoD (DoD) integrates OT devices into the Defense Industrial Base (DIB), it introduces new cyber risks and security challenges. Yet, ensuring OT system security is paramount to mobilization, deployment and the sustainability of military operations.

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform
To stay ahead of today's evolving threat landscape, especially in converged IT/OT environments, your organization needs end-to-end visibility and the ability to prioritize risk across all of your assets — IT, OT and IoT. An exposure management platform like Tenable One enables comprehensive visibility that's critical to ensuring your teams can monitor, analyze and safeguard every component of your digital infrastructure effectively.
OT Security On Demand
専門家が説明する、製造部門の IT/OT セキュリティを向上させる方法を説明
Manufacturers are facing increased cyber attacks, and evolving cyber threats can negatively impact the factory floor, making it challenging to mature your cybersecurity posture and ensure operational resilience. This webinar explores steps you can take to improve both and avoid becoming a target of a cyberattack.
Learning more about
- Common manufacturing security challenges
- Best practices to mature your cyber hygiene
- Best practices to mature your cyber hygiene
- Lessons learned from recent cyber incidents
オペレーションかセキュリティか?誰が OT セキュリティを担うべきか? その理由は?
As OT cybersecurity becomes increasingly complex, it can quickly shift OT security responsibilities within your organization. Without a clear plan that details who is responsible for what, you can quickly and unintentionally increase cyber risk. This webinar explores steps you can take to evaluate and mature your existing OT security practices, with insight from industry experts.
レポートの内容
- Why and how to take control of your OT security
- Why OT security is challenging
- Insights from a recent GigaOm Radar for Operational Technology (OT) Security report
- Takeaways from real-world issues that affect IT-OT attack surfaces
OT Security Trends – From the Boardroom to the Industrial Floor
Critical infrastructure faced a range of new and updated cybersecurity regulations in 2023, leading many organizations to rapidly increase their adoption of OT/ICS security best practices. Moving forward, however, new trends also require the same intense focus. This webinar explores recommendations from OT/ISC security experts about these trends and how you can address them.
レポートの内容
- New OT/ICS attack methods and defense measures
- Changes in the cyber insurance market evolving from new regulations
- Which business drivers increase OT/IoT/IIoT adoption
Understanding Key Principles, Challenges and Solutions of Securing OT and Industrial Control Systems
Cybersecurity professionals understand how important it is to ensure IT devices are protected from cyber risk; however, they can overlook OT and industrial control system (ICS) security. This webinar, which features ICS security experts, takes a closer look at OT/ICS security best practices.
レポートの内容
- Unique OT assets and IT/OT convergence complexities
- How to assess OT threats, including new risks
- Best practices to manage OT cybersecurity
- How to decrease the impact of an OT attack
- Basics for a robust OT/ICS security program
オペレーショナルテクノロジーのセキュリティのための 2 分間のクイックヒント
The Need for Automated Asset Discovery
If you don’t know which assets exist within your OT environment, you can’t protect them. This video explores how Tenable OT Security's automated asset discovery tools will help you overcome challenges created by using a mix of manual processes for asset discovery and management. In two minutes, learn how Tenable OT Security:
- Reduces manual labor, time and expense
- Improves your incident response and recovery processes
- Increases program accuracy and efficiencies
- Addresses compliance requirements
- Helps you implement a reliable and effective vulnerability management process
The Importance of the Industrial Control Plane
ICS networks employ two types of protocols: data plane protocols to manage physical parameters for ongoing processes and control plane protocols to manage engineering activities. In just two minutes, learn:
- 産業用コントロールプレーン (ICP) の監視が困難な理由
- How a lack of security controls impacts your industrial control plane
- What potential problems can arise when you don’t monitor your ICP
- Tenable OT Security がお手伝いできること
Why Industrial Controllers are the Most Important Assets to Protect in ICS Networks
Controllers are the brains of your industrial network, but they are surprisingly vulnerable. That’s because they were designed decades ago with either few protections or none at all, creating OT security risks, which leave you vulnerable for attacks. In two minutes, learn:
- Why networks are often under-protected
- Who can make changes to logic
- 悪意ある変更や誤った変更が継続的な運用と安全に壊滅的な影響を与える可能性
- Tenable OT Security で不正な変更からどのように保護できるのか
Proactive Security on Both Fronts for Industrial Control Environments
導入している OT セキュリティはパッシブですか、それともアクティブですか?ネットワークをリッスンすると同時にデバイスのアクティブクエリも行わなければ、完全な保護は実現できません。 コンバージド IT/OT 環境を保護するには、詳細な資産インベントリとリアルタイム情報が不可欠です。 In two minutes, learn:
- ネットワークに脅威が出現するまで待っているだけでは手遅れになる理由
- 盲点となる場所
- 産業用の環境全体の包括的な可視化を安全かつ効果的に実現する方法
Top Threats to Industrial Control Systems
産業用制御システムと重要インフラの環境に対する攻撃は増加の一途をたどっています。 産業用制御システムやインフラが侵害されると、広範囲にわたる損害が発生し、人命が危険にさらされる可能性があります。 Do you know the top threats to guard against? In two minutes, learn:
- 産業用制御システムがこれまで以上に攻撃されやすくなった理由
- 自社が標的でない場合でも巻き添え被害を受ける可能性
- ネットワーク内の潜在的な脅威
- コントローラーの保護で最も問題になる点
Tenable OT Security: 産業用システムのための産業グレードのセキュリティ
In modern industrial and critical infrastructure environments, an increasing number of devices are now connected to your networks, many of which are internet-facing. This changing OT environment means traditional ways of protecting OT devices, like air-gapping or air walls, are no longer effective.
From malicious insiders and human errors, it’s increasingly challenging to effectively discover, investigate and remediate all the threats lurking against industrial and critical infrastructure environments. また、そのために OT 攻撃も増加しています。
効果的な OT セキュリティのためには、リスクとなるすべての脅威に対する包括的な可視化、セキュリティ、制御が求められます。 Tenable OT Security は、コンバージド IT/OT 環境向けの業界初の統合されたリスクベースのソリューションです。
脅威の検出と緩和
Use a multi-detection engine to find potential high-risk events on your network and alert your team so they can respond quickly.
適応型評価
パッシブモニタリングよりも多くの情報を検出できます。また、運用に影響を与えることなくインフラについて卓越した可視性を実現できます。
リスクベースの脆弱性管理
With Predictive Prioritization, prioritize risks within your ICS network, to mitigate them before attackers exploit vulnerabilities.
設定管理
Get a full history of device configuration changes over time, complete with a back-up snapshot of your last known good state for faster recovery.
完全な可視性
主要な IT セキュリティツールとのネイティブな統合により、IT と OT におけるすべてのリスクを単一のプラットフォームで測定および管理できるようになり、コンバージドアタックサーフェスの包括的な可視化が実現します。
エンタープライズスケールでの管理
Get clear situational awareness across your distributed environment, complete with reporting, vulnerability management and centralized security.
Frequently asked questions about OT Security
オペレーショナルテクノロジー (OT) とは
Operational technology (OT) represents all of the hardware and software to manage, monitor and control physical devices and processes. Some OT examples are distributed control systems (DCSs), programmable logic controllers (PLCs) and human-machine interfaces (HMIs) etc. Industrial control systems have used OT for manufacturing, transportation and utilities since the 1960s.
Unlike information technology (IT), OT in those industries was not originally connected to outside networks. These devices were primarily air-gapped (physical isolation from unsecured networks) for security; however, air-gapping is no longer effective in today’s connected world, and vulnerabilities in an OT system can leave critical infrastructure at risk of sabotage.
オペレーショナルテクノロジーセキュリティとは
Operational technology security includes all the measures you can take to protect your organization’s hardware and software to monitor and manage your physical devices and processes from internal attacks, external attacks or other cyber risks.
Historically, OT involved closed systems. In those closed systems, air-gapping (physical isolation from unsecured networks) was the primary form of security. In today’s highly connected environment, OT security solutions include IT/OT security integration, passive and active threat detection, detailed asset inventory, risk-based vulnerability management and configuration control.
What’s the difference between IT and OT?
There are a few key differences between IT and OT. Information technology is used to store, manage, process and protect information, while operational technology is used to manage, monitor, and control physical devices and processes. IT generally has a stable environment, with a focus on security, a short lifecycle with frequent updating and standard operating systems. OT, on the other hand, may operate in adverse environmental conditions, with a focus on uptime. It also has a long lifecycle with infrequent updating and proprietary operating systems.
Traditionally, IT and OT have been separate. However, today, IT and OT are more interconnected than ever before, creating new attack surfaces and requiring new cybersecurity measures to protect both.
OT インフラとは
OT infrastructure refers to physical equipment and processes that operational technology manages, monitors and controls. It is used in a variety of industries including manufacturing, oil and gas, electrical generation and distribution, aviation, maritime and rail, as well as to control critical infrastructure such as emergency services, water treatment plants, electrical grids and traffic management systems. As part of all these industries and services, OT infrastructure is ubiquitous. It includes valves, pumps, switches, generators, pipelines, fans, PLCs, remote terminal units (RTUs), industrial robots and more.
Industrial Security 管理とは
Industrial security management is the processes used to ensure your industrial control systems (ICS) are safe and secure. Security management practices include visibility, security and control elements. 製造工場を保護するには、潜在的なリスクを最小限に抑えるとともに、すべての資産に対して、産業オートメーションネットワークなどの、被害を最小限に抑える低コストのセキュリティを実現する必要があります。 It’s important to design and manage ICS security so it does not conflict with other important requirements such as performance output, uptime, and workforce-friendliness. オートメーションネットワークのセキュリティの確保は、今日の産業セキュリティ管理における最大の課題です。
What is ICS security?
Industrial control system security (ICS) encompasses all of the processes, hardware and software used to keep ICS safe and secure. ICS security solutions include detailed visibility, asset inventory, passive and active threat detection, risk-based vulnerability management and configuration control. Industrial control systems are a main component of operational technology. ICS includes different types of devices, controls, systems and networks that manage industrial processes. Maintaining ICS safety to decrease risks from internal and external threats is key to keeping most kinds of industrial operations up and running.
エアギャップとは
An air-gap is a physical separation between the OT environment and the rest of the world. No data comes into the OT device from the outside and no data goes out from the OT network.
What is a SCADA system?
A supervisory control and data acquisition (SCADA) system is a control system used to communicate with and collect data from industrial machines, sensors and end devices, often at distributed sites. SCADA then transmits data to computers to process it and make it available to operators and other employees. Your staff can use the analyzed information to make important decisions and quickly control virtually any activity that might occur.
なぜ OT セキュリティは重要なのか
OT security is important because without complete visibility and security for both your OT and IT assets you can’t effectively mitigate your overall cyber risk. The industry relies heavily on automation to ensure high efficiency and minimal down time, while meeting exacting engineering standards. This creates unique and evolving risks for industrial and critical infrastructure organizations. Cyberattacks that target OT, or that begin in IT and laterally move into your OT environment, can destroy your operations, change products and put people’s lives at risk. In addition, the modern level of connectivity between operating technology systems and information technology systems increases your attack surface. Gaps in OT security can lead to a breach that can then be used to access your IT system. A successful attack on IT can disrupt more of your operations and put proprietary information at risk.
IT/OT コンバージェンスとは
IT-OT convergence is the intersection of IT and OT devices and systems within the same environment, whether intentional or accidental. The convergence of OT and IT systems can optimize your production processes, encourage innovation and help your organization become more sustainable. However, it can also increase your attack surface by providing more access points for bad actors to enter your network and disrupt operations. Without complete visibility into all of your assets and security threats, you can’t protect your organization from cyber risks.
Tenable OT セキュリティでコンバージド IT/OT 環境の死角を排除
Get comprehensive visibility into your industrial environment. Actively query your OT devices in their native protocols and get a more complete understanding of your modern attack surface.
- Tenable Nessus