Industrial IoT

Nozomi Networks Works with AWS to Deliver Advanced OT and IoT Cybersecurity and Analytics on the Cloud

Globenewswire | April 20, 2023 | Read time : 02:00 min

Nozomi Networks Works

Nozomi Networks, Inc., a leader in operational technology (OT) and Internet of Things (IoT) security, strengthens its cloud strategy by joining the Amazon Web Services (AWS) Independent Software Vendor (ISV) Accelerate program, a co-sell program for AWS Partners that provides software solutions that run on or integrate with AWS. This will allow AWS sales teams to promote the Nozomi Networks Vantage platform to millions of customers worldwide. Vantage™ is hosted on AWS and is a cloud-based OT/IoT network security solution that equips security professionals and industrial operators with actionable, AI-driven insights to manage risk and speed precise remediation. Now, Vantage is available for purchase in AWS Marketplace.

Vantage is designed to give AWS customers a seamless platform for aggregating, analyzing and monitoring OT systems and data in the cloud with a range of flexible, cost-effective deployment options ideally suited for physical processes. With the rapid emergence of IoT environments and 5G networks, there is growing recognition that cloud networks need access to physical, real-world data which Vantage can deliver for AWS cloud applications.

AWS customers who choose Nozomi Networks Vantage can benefit from an enhanced cybersecurity monitoring and asset intelligence solution that aggregates and analyzes data from physical devices, and then processes and responds to critical issues across large, global enterprises.

“AWS has been a key component of our Vantage offering from day one,” said Andrea Carcano, Nozomi Networks Co-founder and Chief Product Officer. “As we turn to the cloud for scalability and cost-efficiency for our customers through Vantage, our relationship with AWS is becoming increasingly important because of AWS’s cloud expertise, focus on OT and IoT applications and expertise in several key verticals.”

The AWS ISV Accelerate Program is a co-sell program for organizations that provide software solutions that run on or integrate with AWS. The program helps drive new business and accelerate sales cycles by connecting participating ISVs with the AWS Sales organization.

About Nozomi Networks

Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments.

Spotlight

Genomics is the study of the complete set of DNA in a person or other organism. DNA underpins a large proportion of an individual's health and disease status, therefore a genomic medicine approach is increasingly being applied in clinical settings.

Spotlight

Genomics is the study of the complete set of DNA in a person or other organism. DNA underpins a large proportion of an individual's health and disease status, therefore a genomic medicine approach is increasingly being applied in clinical settings.

Related News

Software and Tools, Certifications and Training

Beyond Smart WiFi, boosting customer experience while creating new revenue streams

prnewswire | July 31, 2023

Beyond Technology, a global company with headquarters in the US and offices in Mexico, Latin America, the Middle East, North Africa, APAC and Europe, is launching a unique new solution that will shake up dramatically the way we see connectivity in public spaces. Beyond Smart WiFi (BSWF) implies a powerful Artificial Intelligence managed WiFi network that repairs and optimizes itself and is Operator grade. The WiFi automation brings to the table 20% to 30% wireless network OPEX savings, while the Cloud-based WiFi microservices saves around 20% of CAPEX, support WiFi 6, IoT (Internet of Things), AI, automation, and location-based services. The solution can be integrated into resorts, cruises, malls, theme parks, museums, hospitals, schools and stadiums. Through Precision Marketing by location, BSWF can help companies capture contacts, develop trust relationships, stimulate purchase actions and foster brand loyalty. The platform can segment web visitors based on their interests. Marketers claim to see a 56% increase in their sales when using personalized experiences. BSWF displays the Adds in the cell phone main screen, while normally the competition sends them via SMS or emails, that become pure spam. "This product could become so relevant that it may change the way WiFi networks are being used by all these businesses", says Guillermo Solomon, US CEO at Beyond Technology. With this solution, cross-selling and up-selling strategies can be implemented with much better results. For example, inside a shopping center, if a potential customer passes in front of a store and has logged in with a social network (which happens in 40% of the cases), BSWF will get important data, such as gender, age, and attributes. Then, the system can immediately send a personalized ad about the products of that store that could interest the customer, as well as discount coupons with QR codes. This encourages buying in ranges that exceed 50%. Indoor location with route maps in BSWF is automated with AI, and the network has also Bluetooth and IoT connectivity. If you are in a supermarket and want to buy a folding chair to go camping, instead of looking for an employee, you can get a route map to find the product. AboutBeyond Technology At Beyond Technology, we are a global company that has been in the business of helping transform businesses through technology for over three decades. We have helped different organizations across industries around infrastructure projects, mobility, IoT, and cybersecurity initiatives to ensure they are on top of trends with modernized systems across all sectors, including enterprise and telecommunications, where we specialize heavily.

Read More

IoT Security

8 Vulnerabilities in OAS Platform for IoT Data, Detected by Cisco

Cisco | September 14, 2023

Cisco disclosed eight vulnerabilities in the OAS platform’s engine configuration management functionality. Three of the eight detected vulnerabilities were rated as high-severity. The issues detected in OAS platform v18.00.0072 were addressed and, v19 was released. Cisco's Talos security researchers have identified eight vulnerabilities in the Open Automation Software (OAS) Platform that can be exploited to bypass authentication, disclose sensitive information, and overwrite files. The OAS Platform is commonly used to facilitate communication and data transfer between servers, industrial control systems (ICS), IoT devices, and other hardware in industrial and enterprise settings. The OAS Platform is widely deployed in industrial operations, enterprise environments, and cross-platform integrations. It plays a crucial role in facilitating communication and data exchange across various devices and systems, facilitating logging and notifications. The vulnerabilities pose a significant security risk, especially in environments where the OAS Platform is used for critical industrial and enterprise operations. Unauthorized access and data breaches can lead to operational disruptions and potentially compromise sensitive information. Among the eight vulnerabilities, three are rated as high-severity. Cisco's Talos security researchers were responsible for discovering and disclosing these vulnerabilities. The most critical issues are CVE-2023-31242 and CVE-2023-34998, both of which are authentication bypass flaws. CVE-2023-31242 can be triggered through a sequence of requests, while CVE-2023-34998 can be exploited by sniffing network traffic. The identified vulnerabilities in the OAS Platform mainly revolve around authentication bypass, information disclosure, and file manipulation. Attackers could leverage these weaknesses to create new users, gain unauthorized access, decrypt sensitive information, and perform arbitrary file and directory actions. These vulnerabilities essentially allow attackers to gain unauthorized access to the system by loading and saving configurations to a disk and installing them on other devices. The issues were identified in OAS Platform version 18 and have been addressed in the subsequent release, version 19.00.0000, highlighting the importance of keeping software up-to-date to mitigate security risks. These issues stem from the fact that when the OAS engine is deployed, by default, no admin user is defined and no authentication is required to access functionality such as new user creation. Even if an admin user is created, the configuration must be stored prior to restarting the engine, or it will revert to its default state. An attacker can create a new user, save the changes, and thus gain access to the underlying system. Also, the vulnerability enables an attacker to acquire a protobuf containing valid admin credentials and construct their own requests. The perpetrator could then again obtain access to the underlying system by utilizing the user creation and saving functionality. Cisco warns that these authentication bypass flaws could be combined with CVE-2023-34317, an improper input validation flaw in the user creation functionality, to gain access to the underlying system by adding ‘a user with the username field containing an SSH key.’ CVE-2023-34353 is another high-severity authentication bypass that allows an attacker to perform network snooping to acquire the protobuf containing admin credentials and then decrypt sensitive information. While two of the remaining vulnerabilities could result in information disclosure, the other two could be exploited to create or overwrite arbitrary files and create arbitrary directories.

Read More

Enterprise Iot, Devices

Gorilla Technology Enters Strategic Relationship with British Telecom for AI-Powered Innovative Smart Port Solution

businesswire | July 24, 2023

Gorilla Technology Group Inc. (“Gorilla”) (NASDAQ: GRRR), a global provider of AI-based edge video analytics, IoT technologies, and cybersecurity, today announced a strategic relationship with British Telecom (BT) to deliver an innovative Container Identification and Container Damage Detection solution. This groundbreaking collaboration, which is being actively deployed and tested at the Port of Tyne in Northern England, combines Gorilla’s expertise in video analytics with BT’s extensive network infrastructure, enabling a comprehensive solution that addresses the critical needs of the logistics industry. With the global container shipping industry experiencing unprecedented growth, it has become increasingly challenging for stakeholders to efficiently manage container identification and detect potential damages. Traditional manual inspection methods are time-consuming and prone to human error, leading to significant operational inefficiencies and financial losses. To tackle this industry-wide challenge, Gorilla and BT have joined forces to develop an intelligent, automated solution that leverages advanced video analytics technologies. The container identification and container damage detection solution developed by Gorilla harnesses the power of Artificial Intelligence and machine learning algorithms to analyze video footage captured at various stages of the container management process. By leveraging BT’s robust network infrastructure and Gorilla’s state of the art video analytics platform, the solution can accurately and rapidly identify containers, track movements, and detect any signs of damage or tampering. The solution is currently being deployed at the Port of Tyne, one of the UK’s most innovative and efficient deep sea ports. Located on the River Tyne in Northern England, the Port of Tyne handles cargo from five continents and serves a network of sea routes, major roads and rail. "Our relationship with British Telecom marks a significant milestone in the evolution of container management solutions,” said Dr Rajesh Natarajan, Chief Innovation Officer of Gorilla. “By leveraging the power of video analytics and BT's robust network infrastructure, we can revolutionize how containers are identified, tracked, and monitored. Our solution will empower logistics companies to streamline operations, reduce costs, and improve the overall integrity of the global supply chain." "We are thrilled to work with Gorilla on this groundbreaking solution, which we believe has the power to revolutionize the logistics industry,” said Brian Jackson, Director - Surveillance & SMART Solutions, British Telecom. “This collaboration showcases our commitment to driving innovation and delivering transformative solutions that empower our customers to optimize their operations and enhance supply chain integrity." "We are delighted to work alongside BT, a globally recognized leader in telecommunications, to bring this cutting-edge solution to the market,” said Will Addison, Gorilla Vice President of Operations Europe and MENA. “Together, we aim to set new industry standards in container management and strengthen the competitiveness of the logistics industry in the face of mounting challenges." Gorilla and BT are actively engaging with logistics providers, shipping companies, and other stakeholders to integrate the Container Identification and Container Damage Detection solution into their operations. This collaboration is a testament to the commitment of both organizations to drive technological advancements and deliver tangible value to customers across the logistics ecosystem. About Gorilla Technology Group Inc. Gorilla, headquartered in London U.K., is a global solution provider in security intelligence, network intelligence, business intelligence and IoT technology. Gorilla develops a wide range of solutions including Smart Cities, Smart Retail, Enterprise Security, and Smart Media. In addition, Gorilla provides a complete Security Convergence Platform to government institutions, telecom companies and private enterprises with network surveillance and cyber security.

Read More