The Nozomi Networks add-on for Splunk enables you to consume Nozomi Networks’ unmatched visibility and security with your Splunk instance, including Splunk’s OT Security Add-on.
Nozomi Networks technology delivers value in three areas:
• See all OT and IoT devices and behavior on your networks for unmatched awareness
• Detect cyber threats, vulnerabilities, risks and anomalies for faster response
• Unify security, visibility and monitoring across all your assets for improved resiliency
Nozomi Networks Guardian™ unlocks visibility across converted OT and IoT networks for accelerated security and digital transformation. Its physical and virtual appliances monitor network communications and device behavior, delivering immediate awareness of your OT/IoT networks and their activity patterns. You see the highest priority vulnerabilities as well as threats and anomalous behavior, enabling you to respond faster, ensuring high reliability and security.
Guardian combines asset discovery and network visualization, vulnerability assessment and risk monitoring, real-time anomaly and threat detection to accelerate and simplify response to operational anomalies and attacks.
This add-on enables you to integrate Nozomi Networks data into your Splunk instance to add context and enrich data correlation. You can map a range of inputs from Nozomi Networks into your Splunk data model, including:
* Health Logs
• Default asset information mapping from Nozomi Networks includes asset_id, asset-type, asset_vendor, asset_version, ip, mac, os,
serial number, vendor_product, and zone. You can map additional fields as needed.