Latest news with #OTsecurity


Tahawul Tech
23-07-2025
- Business
- Tahawul Tech
CyberKnight and Nozomi Networks to empower enterprises throughout Africa
CyberKnight, a leading cybersecurity distributor serving the Middle East, Levant, and Africa, is delighted to announce a new strategic partnership with Nozomi Networks, the global leader in operational technology (OT), Internet of Things (IoT), and Cyber-Physical Systems (CPS) security. Under this new agreement, CyberKnight will have the rights to distribute Nozomi Networks products across Africa, excluding South Africa, with a particular focus on Central, East, and West Africa. This collaboration is set to empower large enterprises and critical infrastructure sectors throughout the region with advanced protection and cybersecurity expertise. Nozomi Networks is recognised in the Gartner® Magic Quadrant™ for Cyber-Physical Systems (CPS) Protection Platforms. Out of 17 vendors, Nozomi was ranked as a leader for both vision and execution, highlighting its technical strength and innovative approach. With a remarkable 4.9 out of 5-star rating on Gartner Peer Insights, based on over 120 customer reviews, customers recognise Nozomi for its robust features, straightforward deployment, and exceptional support. This global acclaim affirms Nozomi Networks' role as a trusted partner for organisations seeking reliable OT, IoT and CPS security. Nozomi Networks continues to set new standards in cybersecurity for large enterprises and essential infrastructure. Its solutions provide real-time monitoring and threat detection, allowing organisations to oversee their OT and IoT environments with accuracy and confidence. Key features include: Comprehensive Network Visibility: Organisations benefit from deep insights into their operational systems, enabling proactive identification and resolution of vulnerabilities. This is essential for protecting sectors such as energy, transportation, and manufacturing. Advanced Threat Detection and Response: Using AI and machine learning, Nozomi's technology identifies and responds to threats in real time, reducing the risk of disruptions. Predictive Analytics for Operational Efficiency: Powerful analytics help organisations anticipate challenges and streamline processes, driving productivity and competitiveness. With its extensive network and experience across Africa, CyberKnight's commitment to a zero trust framework ensures organisations are ready for potential breaches and resilient against threats. This partnership with Nozomi Networks brings together advanced security technology and regional expertise, empowering enterprises across Central, East, and West Africa to confidently tackle today's evolving cyber risks. 'Industrial and critical infrastructure organisations across Central and West Africa are rapidly adopting IoT technologies, expanding their digital footprint and, consequently, their attack surface', said Alexander Foroozandé, Head of Channels – Middle East, Africa & CIS, at Nozomi Networks. 'We are dedicated to helping these organisations stay ahead of sophisticated threats with our AI-powered security solutions and strategic regional investments. Our partnership with CyberKnight is a significant step in delivering world-class OT and IoT protection and supporting the region's digital transformation'. 'Our collaboration with Nozomi Networks opens new possibilities for African enterprises to protect what matters most', said Avinash Advani, CEO of CyberKnight. 'Together, we're equipping organisations with the tools and intelligence they need to outpace cyber threats and drive secure, sustainable growth in an increasingly connected world.' Image Credit: CyberKnight & Nozomi Networks


Zawya
14-07-2025
- Business
- Zawya
Fortinet Report: OT Cybersecurity Risk elevates within Executive Leadership Ranks
More than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022, while 95% of organizations report that the C-suite is responsible for OT, up from 41% in 2022 Fortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced the findings from its global 2025 State of Operational Technology and Cybersecurity Report. The results represent the current state of operational technology (OT) cybersecurity and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In addition to trends and insights impacting OT organizations, the report offers best practices to help IT and OT security teams better secure their cyber-physical systems. 'The seventh installment of the Fortinet State of Operational Technology and Cybersecurity Report shows that organizations are taking OT security more seriously. We see this trend reflected in a notable increase in the assignment of responsibility for OT risk to the C-suite, alongside an uptick in organizations self-reporting increased rates of OT security maturity,' said Nirav Shah, Senior Vice President, Products and Solutions, at Fortinet. 'Alongside these trends, we're seeing a decrease in the impact of intrusions in organizations that prioritize OT security. Everyone from the C-suite on down needs to commit to protecting sensitive OT systems and allocating the necessary resources to secure their critical operations.' Key findings from the global survey include: Responsibility for OT security continues to elevate within executive ranks: There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives. As accountability continues to shift into executive leadership, OT security is elevated to a high-profile issue at the board level. The top internal leaders who influence OT cybersecurity decisions are now most likely to be the CISO or CSO by an increasingly wide margin. Now more than half (52%) of organizations report that the CISO/CSO is responsible for OT, up from 16% in 2022. For all C-suite roles, this has spiked to 95%. Additionally, the number of organizations intending to move OT cybersecurity under CISO in the next 12 months has increased from 60% to 80% in 2025. OT cybersecurity maturity is affecting the impact of intrusions: Self-reported OT security maturity has made notable progress this year. At the basic Level 1, 26% of organizations report establishing visibility and implementing segmentation, up from 20% in the previous year. The largest number of organizations state their security maturity is at the Level 2 access and profiling phase. The report also found a correlation between maturity and attacks. Those organizations that report being more mature (higher of Levels 0–4) are seeing fewer attacks or indicate that they are better able to handle lower-sophistication tactics, such as phishing. It's worth noting that some tactics, such as advanced persistent threats (APT) and OT malware, are difficult to detect, and less mature organizations may not have the security solutions in place to determine they exist. Overall, although nearly half of organizations experienced impacts, the impact of intrusions on organizations is declining, with a noteworthy reduction in operational outages that impacted revenue, which dropped from 52% to 42%. Adopting cybersecurity best practices is having a positive impact: In addition to the Levels of maturity affecting the impact of intrusions, it appears that adopting best practices such as implementing basic cyber hygiene and better training and awareness are having a real impact, including a significant drop in business email compromise. Other best practices include incorporating threat intelligence, which spiked (49%) since 2024. Additionally, the report saw a significant decrease in the number of OT device vendors, which is a sign of maturity and operational efficiency. More organizations (78%) are now using only one to four OT vendors, which indicates that many of these organizations are consolidating vendors as part of their best practices. Cybersecurity vendor consolidation is also a sign of maturity and corresponds to Fortinet customer experiences with the Fortinet OT Security Platform. Unified networking and security at remote OT sites enhanced visibility and reduced cyber risks, leading to a 93% reduction in cyber incidents vs. a flat network. The simplified Fortinet solutions also led to a 7x improvement in performance through reductions in triage and setup.1 Best Practices Fortinet's global 2025 State of Operational Technology and Cybersecurity Report provides actionable insights for organizations to strengthen their security posture. Organizations can address OT security challenges by adopting the following best practices: Establish visibility and compensating controls for OT assets: Organizations need the ability to see and understand everything that's on their OT networks. Once visibility is established, organizations then need to protect critical devices and ones that may be vulnerable, which requires protective compensating controls that are designed for sensitive OT devices. Capabilities such as protocol-aware network policies, system-to-system interaction analysis, and endpoint monitoring can detect and prevent compromise of vulnerable assets. Deploy segmentation: Reducing intrusions requires a hardened OT environment with strong network policy controls at all access points. This kind of defensible OT architecture starts with creating network zones or segments. Standards such as ISA/IEC 62443 specifically call for segmentation to enforce controls between OT and IT networks and between OT systems. Teams should also evaluate the overall complexity of managing a solution and consider the benefits of an integrated or platform-based approach with centralized management capabilities. Integrate OT into security operations (SecOps) and incident response planning: Organizations should be maturing toward IT/OT SecOps. To get there, OT needs to be a specific consideration for SecOps and incident response plans, largely because of some of the distinctions between OT and IT environments, from unique device types to the broader consequences of an OT breach impacting critical operations. One key step in this direction is to have playbooks that include your organization's OT environment. This kind of advanced preparation will foster better collaboration across IT, OT, and production teams to adequately assess cyber and production risks. It can also ensure that the CISO has proper awareness, prioritization, budget, and personnel allocations. Consider a platform approach to your overall security architecture: To address rapidly evolving OT threats and an expanding attack surface, many organizations have assembled a broad array of security solutions from different vendors. This has yielded an overly complex security architecture that inhibits visibility while placing an increased burden on limited security team resources. A platform-based approach to security can help organizations consolidate vendors and simplify their architecture. A robust security platform with specific capabilities for both IT networks and OT environments can provide solution integration for improved security efficacy while enabling centralized management for enhanced efficiency. Integration can also provide a foundation for automated responses to threats. Embrace OT-specific threat intelligence and security services: OT security depends on timely awareness and precise analytical insights about imminent risks. A platform-based security architecture should also apply AI-powered threat intelligence for near-real-time protection against the latest threats, attack variants, and exposures. Organizations should ensure their threat intelligence and content sources include robust, OT-specific information in their feeds and services. Report Overview The Fortinet 2025 State of Operational Technology and Cybersecurity Report is based on data from a global survey of more than 550 OT professionals, conducted by a third-party research company. Survey respondents were from different locations around the world, including Australia, New Zealand, Argentina, Brazil, Canada, Mainland China, Colombia, Denmark, Egypt, France, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Malaysia, Mexico, Norway, Philippines, Poland, Portugal, Singapore, South Africa, South Korea, Spain, Taiwan, Thailand, United Kingdom, and the United States, among others. Respondents represent a range of industries that are heavy users of OT, including: manufacturing, transportation/logistics, healthcare/pharma, oil, gas, and refining, energy/utilities, chemical/petrochemical, and water/wastewater. Most of those surveyed, regardless of title, are deeply involved in cybersecurity purchasing decisions. Many respondents are responsible for operations technology at their organization and/or have reporting responsibility for manufacturing or plant operations. About Fortinet Fortinet (Nasdaq: FTNT) is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere our customers need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The Fortinet Training Institute, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. Collaboration with esteemed organizations from both the public and private sectors, including Computer Emergency Response Teams ('CERTS'), government entities, and academia, is a fundamental aspect of Fortinet's commitment to enhance cyber resilience globally. FortiGuard Labs, Fortinet's elite threat intelligence and research organization, develops and utilizes leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence.
Yahoo
09-07-2025
- Business
- Yahoo
NTT DOCOMO BUSINESS and IIJ Unveil Integrated OT Security Management Solution for Cyber-Physical Systems
TOKYO, July 9, 2025 /PRNewswire/ -- NTT DOCOMO BUSINESS, Inc. (Formerly NTT Communications Corporation) and Internet Initiative Japan Inc. (IIJ) today announced an integrated security offering for cyber-physical systems (CPS). Expanded remote operation can expose control networks and introduce risks, but many cyber-physical systems (CPS) and operational technology (OT) security administrators still lack accurate asset inventories and real-time anomaly detection needed to govern access. The new offering combines solutions from OsecT and Safous in a convenient, pre-installed hardware appliance to deliver passive traffic inspection, instant threat alerts, and strictly managed remote access. Once installed, Safous establishes encrypted least-privilege tunnels for engineers, integrators, or vendors, enforces fine-grained policies, safeguards shared credentials, supports Just-in-Time approvals, and records every session. Simultaneously, OsecT taps mirrored OT traffic, maps every device, and flags unauthorized communication, unknown endpoints, or abnormal protocols. As a result, security and operations teams can review IDS alerts alongside access logs to accelerate investigation and response. Key Features OT-Aware IDS: OsecT analyses on-prem OT traffic, inventories devices, and issues live alerts on suspicious activity. Secure Privileged Remote Access: Safous restricts users to approved OT applications via a secure portal with credential vaulting, approval workflows, and full session recording. Rapid Deployment: Software installs quickly in existing OT environments, reducing integration effort and enabling a faster time to value. Sales are scheduled to start on September 1, 2025 in Japan and will be handled exclusively by NTT DOCOMO BUSINESS ASEAN availability to support regional smart manufacturing and industrial cybersecurity initiatives is expected in 2026. NTT DOCOMO BUSINESS and IIJ will continue leveraging their combined network and cloud expertise to safeguard the next generation of cyber-physical systems worldwide. View original content: SOURCE Internet Initiative Japan Inc.
Yahoo
01-07-2025
- Business
- Yahoo
Hanwha Ocean secures AIP for cybersecurity solution for FPSO units
Hanwha Ocean has secured approval in principle (AIP) from the American Bureau of Shipping (ABS) for its new cybersecurity system for floating production storage and offloading (FPSO) units. This solution aims to protect critical infrastructure and operations, enhancing security for offshore facilities. In collaboration with SIGA Data Security, Hanwha Ocean designed an operational technology (OT) cybersecurity solution specifically to defend vital OT systems against cyber threats, thereby improving the overall cyber resilience of FPSO units. Hanwha Ocean Offshore president Philippe Levy said: 'Receiving this AIP from ABS marks a significant step forward for Hanwha Ocean. It underscores our commitment to innovation and operational resilience in offshore environments. 'Our strategic partnership with ABS and SIGA enables us to offer validated, leading-edge cybersecurity solutions that provide enhanced process-level visibility, real-time threat detection, and effective remote operational oversight, all fully aligned with stringent offshore industry compliance standards and segmentation architectures.' The AIP was granted following ABS's thorough design reviews, ensuring compliance with class and statutory requirements. This cybersecurity initiative is part of a multi-year offshore technology collaboration agreement between ABS and Hanwha Ocean, focusing on innovative projects in sustainability, digitalisation, artificial intelligence, and operational technology cybersecurity. ABS Global Offshore senior vice president Miguel Hernandez said: 'This is an exciting achievement for both organisations. Together, under this agreement, ABS and Hanwha Ocean are using our collective resources and extensive experience to address challenges unique to offshore energy production. 'As connectivity improves for offshore assets, the cyber risks increase. This new OT solution promises to help operators address vulnerabilities in their critical operations systems.' In February this year, Hanwha Power Systems and Hanwha Ocean partnered with Baker Hughes to develop ammonia gas turbines for ships. Announced at the Baker Hughes Annual Meeting in Florence, Italy, the collaboration aims to create low-carbon propulsion systems by 2028. "Hanwha Ocean secures AIP for cybersecurity solution for FPSO units" was originally created and published by Ship Technology, a GlobalData owned brand. The information on this site has been included in good faith for general informational purposes only. It is not intended to amount to advice on which you should rely, and we give no representation, warranty or guarantee, whether express or implied as to its accuracy or completeness. You must obtain professional or specialist advice before taking, or refraining from, any action on the basis of the content on our site.


Globe and Mail
01-07-2025
- Business
- Globe and Mail
Fortinet Recognized as the Overall Leader for the Third Time in a Row in the Westlands Advisory IT/OT Network Protection Platform Navigator 2025™ Report
SUNNYVALE, Calif., July 01, 2025 (GLOBE NEWSWIRE) -- News Summary Fortinet ® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced that Westlands Advisory, a leading OT security industry analysis and strategy firm, has once again named Fortinet as the Overall Leader in the IT/OT Network Protection Platform Navigator 2025 report, earning the top ranking in both strategic direction and capability for IT/OT. Since its inception and for the third time in a row, the latest report from Westlands Advisory highlights Fortinet's extensive OT network security experience, noting that 'OT cybersecurity has been a key strategic pillar' for Fortinet, 'resulting in significant innovation, product expansion, growing alliances, and increasing market share.' "For more than 20 years, organizations have trusted Fortinet to protect operational technology environments and ensure compliance with the evolving needs of OT infrastructures. Fortinet uniquely delivers a comprehensive OT security platform, built from the ground up with the industry's most advanced threat detection and protection capabilities to enable converged IT/OT infrastructure,' said Nirav Shah, Senior Vice President, Products and Solutions at Fortinet. 'Our latest recognition from Westlands Advisory reflects the deep and growing trust our customers, partners, and the broader OT security community place in Fortinet.' Delivering Secure IT/OT Network Convergence The Fortinet OT Security Platform is unique in its ability to provide end-to-end network segmentation, OT asset and network visibility, network segmentation and microsegmentation, and advanced threat protection in a unified platform that is centrally managed and automated. With deep integration into the Fortinet Security Fabric, the OT Security Platform improves cyber resiliency and production reliability, lowers time to deployment, and simplifies operations to further support the protection of critical infrastructure and OT infrastructure from evolving cyberthreats. The Westlands Advisory report addresses several key benefits of the Fortinet OT Security Platform for customers, including: Broad, integrated, high-performance security solutions and services across IT and OT infrastructures: Westlands Advisory highlights Fortinet's delivery of a single platform across IT and OT to help reduce cyber risks across the entire organization. The OT Security Platform, an extension of the Fortinet Security Fabric, uniquely provides the widest and deepest breadth of networking and cybersecurity solutions in the market. These solutions provide near-real-time protection through the company's AI-driven OT Security Service, powered by FortiGuard Labs, that enables OT-specific application- and protocol-based security, as well as virtual patching capabilities to shield unpatched OT assets from exploitation. As Westlands Advisory notes, the Fortinet OT Security Platform consists of over 20 products across three solution pillars: Secure Networking, Unified SASE, and Security Operations. The report goes on to say: 'In addition, the technology integration offered through the OT Security Platform extends beyond Fortinet solutions to third-party technologies, delivering a comprehensive and centralized OT service.' Cutting-edge innovation to solve urgent OT security use cases: The Fortinet OT Security Platform is also recognized by Westlands Advisory for its cutting-edge advancements and innovations that help customers solve many urgent and real OT use cases, such as asset discovery and management; network protection and segmentation; endpoint protection; secure remote access; and more. According to Westlands Advisory, 'Fortinet offers the broadest range of industrial-grade security hardware solutions, including FortiGate Rugged firewalls and FortiSwitch industrial switches… Fortinet's product roadmap is highly responsive to customer requirements and industry standards and has resulted in a number of industry awards, including the 2024 Red Dot Product Design Award [FortiGate Rugged 70G with Dual 5G Modems].' Additional recognitions include the Control Engineering 2024 Silver Product of the Year Award for FortiGate Rugged 70F, and the 2025 Gold Product of the Year Award for FortiGate Rugged 70G-5G-DUAL. The Westlands report also notes that the company's OT security innovation extends to AI and ML, 'where the focus has been on detections, understanding risk, and improving security operations.' High-performance, energy-efficient, cost-effective solutions compared to other OT security solutions: Fortinet's custom-built ASIC technology, embedded in FortiGate appliances, offers unmatched network security performance and reliability, which is critical in OT environments that run 24x7 or cannot suffer downtime. These custom ASICs, which include a networking processor and security processor, are integrated with the FortiOS operating system, allowing Fortinet to provide a comprehensive, high-performance networking and security solution that addresses the demands of modern network environments. With the recognition of the Fortinet OT Security Platform, the Westlands report underscores the importance of IT/OT convergence and reaffirms that organizations don't have to choose between performance and protection. Additional Resources Download the Westlands Advisory IT/OT Network Protection Platform Navigator 2025 report and read the blog post. Learn more about Fortinet OT security solutions. Visit to learn about Fortinet innovation, collaboration partners, product security processes, and enterprise-grade products. Read about how Fortinet customers are securing their organizations. Learn about Fortinet's commitment to product security and integrity, including its responsible product development and vulnerability disclosure approach and policies. Follow Fortinet on X, LinkedIn, Facebook, and Instagram. Subscribe to Fortinet on our blog or YouTube. About Fortinet Fortinet (Nasdaq: FTNT) is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere our customers need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The Fortinet Training Institute, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. Collaboration with esteemed organizations from both the public and private sectors, including Computer Emergency Response Teams ('CERTS'), government entities, and academia, is a fundamental aspect of Fortinet's commitment to enhance cyber resilience globally. FortiGuard Labs, Fortinet's elite threat intelligence and research organization, develops and utilizes leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence. Learn more at the Fortinet Blog, and FortiGuard Labs. Copyright © 2025 Fortinet, Inc. All rights reserved. The symbols ® and ™ denote respectively federally registered trademarks and common law trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, the Fortinet logo, FortiGate, FortiOS, FortiGuard, FortiCare, FortiAnalyzer, FortiManager, FortiASIC, FortiClient, FortiCloud, FortiMail, FortiSandbox, FortiADC, FortiAI, FortiAIOps, FortiAgent, FortiAntenna, FortiAP, FortiAPCam, FortiAuthenticator, FortiCache, FortiCall, FortiCam, FortiCamera, FortiCarrier, FortiCASB, FortiCentral, FortiCNP, FortiConnect, FortiController, FortiConverter, FortiCSPM, FortiCWP, FortiDAST, FortiDB, FortiDDoS, FortiDeceptor, FortiDeploy, FortiDevSec, FortiDLP, FortiEdge, FortiEDR, FortiExplorer, FortiExtender, FortiFirewall, FortiFlex FortiFone, FortiGSLB, FortiGuest, FortiHypervisor, FortiInsight, FortiIsolator, FortiLAN, FortiLink, FortiMonitor, FortiNAC, FortiNDR, FortiPAM, FortiPenTest, FortiPhish, FortiPoint, FortiPolicy, FortiPortal, FortiPresence, FortiProxy, FortiRecon, FortiRecorder, FortiSASE, FortiScanner, FortiSDNConnector, FortiSIEM, FortiSMS, FortiSOAR, FortiSRA, FortiStack, FortiSwitch, FortiTester, FortiToken, FortiTrust, FortiVoice, FortiWAN, FortiWeb, FortiWiFi, FortiWLC, FortiWLM, FortiXDR and Lacework FortiCNAPP. Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, contract, binding specification or other binding commitment by Fortinet or any indication of intent related to a binding commitment, and performance and other specification information herein may be unique to certain environments.