Cloud

11/8/2017
06:47 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Siemens Teams Up with Tenable

ICS/SCADA vendor further extends its managed security services for critical infrastructure networks.

Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) giant Siemens this week added another tool to its newly revamped managed security services for the industrial sector.

Siemens, which in September announced it had added anomaly detection technology from PAS to its existing network monitoring and security services, now will incorporate Tenable Network Security's vulnerability detection and management technology into a new managed security service offering for critical infrastructure providers.

Managed security services has become an attractive new role for Siemens and other major ICS/SCADA equipment vendors, whose industrial customers are increasingly in the bullseye of malware infections and nation-state hackers looking for leverage against other nations. Industrial networks notoriously are short on cybersecurity expertise and technology as they continue to play catch-up in locking down their networks from attackers. So for Siemens and its competitors, offering managed security services is a logical next step in their strategies.

Siemens' process control systems were infamously abused by the Stuxnet worm that ultimately sabotaged centrifuges in Iran's Natanz nuclear facility and served as a major wakeup call for utilities worldwide after it hit seven years ago. In the wake of the attacks, Siemens was among the first ICS/SCADA vendor to build a secure software development program and roll out new products with built-in security features.

Leo Simonovich, Siemens' vice president and global head of industrial cyber and digital security, says Tenable's vulnerability management brings to the service the ability to find and prioritize vulnerabilities and fixes in an industrial network. "Our [industrial] customers today are overwhelmed with the number of notifications they get, and on the IT side, they don't necessarily have the abilities and manpower to address them," he says.

Tenable's Nessus-based technology differs from PAS's anomaly detection technology, which monitors all brands of industrial and computing equipment on a plant network. "Tenable provides the same problem set from a network point of view. It's important to have both" points of view of the environment, he says.

"We're focusing on identifying assets [in the network], so there's a little overlap there with" PAS's technology in Siemens' managed security offering, says Ray Komar, vice president of technical alliances at Tenable. "We add a vulnerability perspective, so less on configuration like [PAS]."

Siemens earlier this year added network monitoring to its services via a partnership with Darktrace. Siemens' new offering with Tenable will be available in early 2018, with oil and gas and other utilities as the main focus, Simonovich says.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6978
PUBLISHED: 2018-12-18
vRealize Operations (7.x before 7.0.0.11287810, 6.7.x before 6.7.0.11286837 and 6.6.x before 6.6.1.11286876) contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin user of the vROps application with shell access may exploit this issue to elevate the...
CVE-2018-20213
PUBLISHED: 2018-12-18
wbook_addworksheet in workbook.c in libexcel.a in libexcel 0.01 allows attackers to cause a denial of service (SEGV) via a long name. NOTE: this is not a Microsoft product.
CVE-2017-15031
PUBLISHED: 2018-12-18
In all versions of ARM Trusted Firmware up to and including v1.4, not initializing or saving/restoring the PMCR_EL0 register can leak secure world timing information.
CVE-2018-19522
PUBLISHED: 2018-12-18
DriverAgent 2.2015.7.14, which includes DrvAgent64.sys 1.0.0.1, allows a user to send an IOCTL (0x800020F4) with a buffer containing user defined content. The driver's subroutine will execute a wrmsr instruction with the user's buffer for partial input.
CVE-2018-1833
PUBLISHED: 2018-12-18
IBM Event Streams 2018.3.0 could allow a remote attacker to submit an API request with a fake Host request header. An attacker, who has already gained authorised access via the CLI, could exploit this vulnerability to spoof the request header. IBM X-Force ID: 150507.