Intelligent CIO Europe Issue 66 | Page 52

COUNTRY FOCUS : NORDICS
According to Bailey , Wärtsilä tested several vendor technologies before selecting Tenable OT Security .
“ Many of these asset management tools are passive – they sniff the network by looking at the traffic at the mirror port and using that information to decipher assets . Tenable uses a proprietary approach to query devices in a safe way , PLCs for example , to get rich asset information . And that ’ s where it really shined for us ,” said Bailey .
As Wärtsilä rolls out the Tenable OT Security solutions across its dynamic environment , the partnership with the Tenable team has been crucial for a successful deployment .
“ The great thing about using Tenable OT Security is working with the Tenable people ,” said Bailey . “ They have great technical expertise , appropriately sizing our environment and positioning us to scale as our licensing needs grow .”
Tenable OT Security ’ s automated asset discovery and visualisation capabilities provide a comprehensive , up-to-date inventory of all assets . This includes workstations , servers , Human-Machine Interfaces ( HMIs ) and programmable logic controllers ( PLCs ), including dormant devices that do not communicate frequently over the network . The latter it uncovers by leveraging its patented active querying capabilities . The results are detailed device information , such as firmware and OS versions , internal configurations and serial numbers .
“ With regulations like the Cyber Resilience Act coming into law , the need to disclose real-time vulnerability information in a short amount of time adds a huge challenge we ’ d not be able to meet without a solution like Tenable OT Security ,” added Bailey .
Wärtsilä helps customers visualise asset inventory and protect key infrastructures
Now , Wärtsilä can deliver a complete asset inventory to its customers . During site acceptance testing , Tenable OT Security is integrated with each customer ’ s environment to provide a way to scan the project delivery and existing assets to obtain a complete asset inventory , as well as allow manual asset enrichment for legacy devices . This improved visibility helps customers protect critical infrastructure while meeting compliance requirements .
“ There is no silver bullet when asset scanning in an OT environment . Some of these old devices are not compatible with any proprietary protocols or even
52 INTELLIGENTCIO EUROPE www . intelligentcio . com