CINXE.COM

Apply ISA/IEC 62443 Standards

<!DOCTYPE html><!-- Last Published: Fri Nov 22 2024 22:19:16 GMT+0000 (Coordinated Universal Time) --><html data-wf-domain="www.nozominetworks.com" data-wf-page="65ba95944afbf2ed2a8d1277" data-wf-site="645a4534705010e2cb244f50" lang="en"><head><meta charset="utf-8"/><title>Apply ISA/IEC 62443 Standards</title><meta content="Learn how Nozomi Networks&#x27; solution helps operational technology (OT) security teams apply the ISA/IEC 62443 standards." name="description"/><meta content="Apply ISA/IEC 62443 Standards" property="og:title"/><meta content="Learn how Nozomi Networks&#x27; solution helps operational technology (OT) security teams apply the ISA/IEC 62443 standards." property="og:description"/><meta content="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/660ad9d97344610928d1f919_ISA-IEC-62443-Thumb.webp" property="og:image"/><meta content="Apply ISA/IEC 62443 Standards" property="twitter:title"/><meta content="Learn how Nozomi Networks&#x27; solution helps operational technology (OT) security teams apply the ISA/IEC 62443 standards." property="twitter:description"/><meta content="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/660ad9d97344610928d1f919_ISA-IEC-62443-Thumb.webp" property="twitter:image"/><meta property="og:type" content="website"/><meta content="summary_large_image" name="twitter:card"/><meta content="width=device-width, initial-scale=1" name="viewport"/><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/css/nozomi-2023.5a461d78a.min.css" rel="stylesheet" type="text/css"/><link href="https://fonts.googleapis.com" rel="preconnect"/><link href="https://fonts.gstatic.com" rel="preconnect" crossorigin="anonymous"/><script src="https://ajax.googleapis.com/ajax/libs/webfont/1.6.26/webfont.js" type="text/javascript"></script><script type="text/javascript">WebFont.load({ google: { families: ["Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic","Vollkorn:400,400italic,700,700italic","Merriweather:300,300italic,400,400italic,700,700italic,900,900italic","Open Sans:300,300italic,400,400italic,600,600italic,700,700italic,800,800italic","Oswald:200,300,400,500,600,700"] }});</script><script type="text/javascript">!function(o,c){var n=c.documentElement,t=" w-mod-";n.className+=t+"js",("ontouchstart"in o||o.DocumentTouch&&c instanceof DocumentTouch)&&(n.className+=t+"touch")}(window,document);</script><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65dca135c2a0377136b5d42b_NN-Favicon-32x32px.png" rel="shortcut icon" type="image/x-icon"/><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65dca12dbfa711f6599f64a5_NN-Favicon-256x256px-white.png" rel="apple-touch-icon"/><link href="https://www.nozominetworks.com/compliance/isa-iec-62443-standards" rel="canonical"/><script async="" src="https://www.googletagmanager.com/gtag/js?id=G-XPDLLMSMHQ"></script><script type="text/javascript">window.dataLayer = window.dataLayer || [];function gtag(){dataLayer.push(arguments);}gtag('js', new Date());gtag('set', 'developer_id.dZGVlNj', true);gtag('config', 'G-XPDLLMSMHQ');</script><script id="jetboost-script" type="text/javascript"> window.JETBOOST_SITE_ID = "clj7g82ou015p0qp589h903v7"; (function(d) { var s = d.createElement("script"); s.src = "https://cdn.jetboost.io/jetboost.js"; s.async = 1; d.getElementsByTagName("head")[0].appendChild(s); })(document); </script> <style> .image-div-fit { object-fit: cover; object-position: bottom left; } .image-div-fit-related { object-fit: cover; object-position: bottom left; } .image-div-fit-blog { object-position: center!important; } .code-snippet { padding: 40px; background-color: #efefef; width: 100%; overflow-wrap: anywhere; font-family: Courier New; } .footer-subscribe-embed-box .hs-form-private { display: block!important; } .footer-subscribe-embed-box label { margin-bottom: 5px; color: #fff; font-family: Montserrat; font-weight: 400; } .footer-subscribe-embed-box .hs-input { padding: 10px; border-radius: 5px; font-family: Montserrat; font-size: 14px; border: 0px; width: 95%; min-width: 275px; margin-right: 10px; } .footer-subscribe-embed-box .hs-fieldtype-checkbox { margin-top: 15px; } .footer-subscribe-embed-box li .hs-input { min-width: 0px!important; width: 15px; list-style-type: none; } .footer-subscribe-embed-box .inputs-list { padding-left: 0px; list-style-type: none; } .sidebar-newsletter-box .hs-fieldtype-checkbox { margin-top: 15px; } .sidebar-newsletter-box li .hs-input { min-width: 0px!important; width: 15px; list-style-type: none; font-weight: 400; font-size: 12px; } .sidebar-newsletter-box .inputs-list { padding-left: 0px; list-style-type: none; } .footer-subscribe-embed-box .is-placeholder { padding-bottom: 8px!important; } .footer-subscribe-embed-box .hs-input option { padding-bottom: 0px!important; } .sidebar-newsletter-box .hs-input { padding: 10px; border-radius: 5px; font-family: Montserrat; font-size: 11px; border: 0px; width: 95%; margin-right: 10px; } .sidebar-newsletter-box .hs-error-msg { font-size: 12px; font-weight: 800; font-family: Montserrat; color: #D13164; } .sidebar-newsletter-box .hs-error-msgs { padding-left: 0px; list-style-type: none } .sidebar-newsletter-box label { font-family: Montserrat; color: #fff; font-weight: 400; font-size: 12px; } .sidebar-newsletter-box .hs-button { margin-top: 5px; margin-bottom: 10px; font-size: 14px; padding: 10px; padding-left: 20px; padding-right: 20px; color: #fff; background-color: #D13164; border: 0px; font-family: Montserrat; font-weight: 400; border-radius: 20px; box-shadow: 0px 4px 8px rgba(0, 0, 0, 0.3); } .sidebar-newsletter-box .hs-form-private { justify-content: left!important; } .footer-subscribe-embed-box .hs-button { margin-top: 5px; margin-bottom: 10px; font-size: 14px; padding: 10px; padding-left: 20px; padding-right: 20px; color: #fff; background-color: #D13164; border: 0px; font-family: Montserrat; font-weight: 400; border-radius: 20px; box-shadow: 0px 4px 8px rgba(0, 0, 0, 0.3); } .footer-subscribe-embed-box .hs-error-msgs{ padding-left: 15px; color: #D13164; font-family: Montserrat; font-size: 10px; display: block!important; } .footer-subscribe-embed-box .hs-fieldtype-select { margin-right: -12px; } .footer-subscribe-embed-box .submitted-message { max-width: 350px; margin-left: auto; margin-right: auto; font-size: 14px; font-family: Montserrat; text-align: center; color: #fff; font-weight: 700; } .legal-content-section { justify-content: flex-start; display: flex; line-height: 26px; font-family: 'Montserrat'; font-size: 18px; font-weight: 400; } .legal-content-section h5 { margin-top: 10px; font-size: 18px; line-height: 26px; } .legal-content-section li { font-weight: 400; line-height: 24px; margin-bottom: 8px; } @supports (display: flex) { @media screen and (max-width: 480px) { .footer-subscribe-embed-box .hs-form-private { display: block!important; } } } </style> <script>    var hsscript = document.createElement("script");    hsscript.src = "https://cdn.jsdelivr.net/npm/hockeystack@latest/hockeystack.min.js";    hsscript.async = 1;    hsscript.dataset.apikey = "5105728fe4c8805a36893632a83b6e";    hsscript.dataset.cookieless = 1;    hsscript.dataset.autoIdentify = 1;    document.getElementsByTagName('head')[0].append(hsscript); </script> <script> document.addEventListener("DOMContentLoaded", function() { var authorElement = document.querySelector('.post-author-text-byline-author'); if (authorElement) { var authorName = authorElement.textContent.trim(); window.dataLayer = window.dataLayer || []; window.dataLayer.push({ 'event': 'authorDataReady', 'author': authorName }); } else { console.error("Author element not found"); } }); </script> <!-- OneTrust Cookies Consent Notice start for nozominetworks.com --> <script src=https://cdn.cookielaw.org/scripttemplates/otSDKStub.js type="text/javascript" charset="UTF-8" data-domain-script="1b3a08d1-270d-4dc7-8bd4-239c4aab3143" ></script> <script type="text/javascript"> function OptanonWrapper() { } </script> <!-- OneTrust Cookies Consent Notice end for nozominetworks.com --> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-NMJG569" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <script> window.dataLayer = window.dataLayer || []; </script> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!=='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-NMJG569');</script> <!-- End Google Tag Manager --> <!-- Start of HubSpot Embed Code --> <script type="text/javascript" id="hs-script-loader" async defer src="https://js.hs-scripts.com/2724979.js"></script> <!-- End of HubSpot Embed Code --> <!-- Start of Navattic Embed Code --> <script>void 0===window.navatticQueue&&(window.navatticQueue=[],window.navattic=new Proxy({},{get:function n(t,u,e){return function(){for(var n=arguments.length,t=Array(n),e=0;e<n;e++)t[e]=arguments[e];return navatticQueue.push({function:u,arguments:t})}}}));</script> <script async src=https://js.navattic.com/sdk.js data-key="pkey_cm34kqm5r01wars3b4wc40m5f"></script> <!-- End of Navattic Embed Code --><link rel="alternate" hreflang="en" href="https://www.nozominetworks.com/compliance/isa-iec-62443-standards"> <link rel="alternate" hreflang="de" href="https://de.nozominetworks.com/compliance/isa-iec-62443-standards"> <link rel="alternate" hreflang="es" href="https://es.nozominetworks.com/compliance/isa-iec-62443-standards"> <link rel="alternate" hreflang="fr" href="https://fr.nozominetworks.com/compliance/isa-iec-62443-standards"> <link rel="alternate" hreflang="it" href="https://it.nozominetworks.com/compliance/isa-iec-62443-standards"> <link rel="alternate" hreflang="ja" href="https://ja.nozominetworks.com/compliance/isa-iec-62443-standards"> <link rel="alternate" hreflang="ko" href="https://ko.nozominetworks.com/compliance/isa-iec-62443-standards"> <link rel="alternate" hreflang="pt-br" href="https://pt-br.nozominetworks.com/compliance/isa-iec-62443-standards"> <script type="text/javascript" src="https://cdn.weglot.com/weglot.min.js"></script> <script> Weglot.initialize({ api_key: 'wg_f524bcd5524f694e7a49cc49e108186a4' }); </script><script type="text/javascript">window.__WEBFLOW_CURRENCY_SETTINGS = {"currencyCode":"USD","symbol":"$","decimal":".","fractionDigits":2,"group":",","template":"{{wf {\"path\":\"symbol\",\"type\":\"PlainText\"} }} {{wf {\"path\":\"amount\",\"type\":\"CommercePrice\"} }} {{wf {\"path\":\"currencyCode\",\"type\":\"PlainText\"} }}","hideDecimalForWholeNumbers":false};</script></head><body><div class="navigation-full"><section class="announcement-bar"><div class="w-layout-blockcontainer announcement-bar-container w-container"><div class="announcement-bar-text"><strong>Live Demo: The Nozomi Networks Platform in 15 Minutes<br/></strong></div><a href="https://www.nozominetworks.com/resources/live-demo-the-nozomi-networks-platform-in-15-minutes" target="_blank" class="announcement-bar-button w-button">Register Now</a></div></section><div class="navigation-top-banner"><div class="container-navigation top-menu-container w-container"><div class="navigation-link-wrapper top-navigation-link-wrapper"><a href="/academy" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Academy</div></a><a href="/labs" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Labs</div></a><a href="/company/careers" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Careers</div></a><a href="https://partners.nozominetworks.com/English/" target="_blank" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Partner Login</div></a><a href="/support" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Support</div></a><div class="search-bar-container"><form action="/search" class="search w-form"><input class="search-input new-search w-input" maxlength="256" name="query" placeholder="Search our site" type="search" id="search" required=""/><input type="submit" class="search-button new-search-button w-button" value=""/></form></div></div></div></div><div data-collapse="medium" data-animation="default" data-duration="400" data-easing="ease" data-easing2="ease" role="banner" class="navigation w-nav"><div class="container-navigation"><div class="navigation-link-wrapper"><a href="/" class="brand w-nav-brand"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647cdfc8e9b140d6c4dd4877_nozomi-logo.svg" loading="eager" width="Auto" height="Auto" alt="Nozomi logo" class="logo-image"/></a></div><div class="navigation-button-wrapper"><nav role="navigation" class="menu-wrap w-nav-menu"><div data-hover="false" data-delay="0" data-w-id="1ab40eba-a5f5-f7de-7704-089030f70ece" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Platform</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid"><div id="w-node-_3ea21f8a-1846-69ab-921e-8e8150a3c30a-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dee6d3014cdc037112e34_nozomi-platform-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header">Platform Overview</h3><p class="nozomi-mega-menu-white-box-paragraph">Our industrial cybersecurity solutions deliver unmatched asset intelligence, threat detection and AI-driven insights.</p><a href="/products" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_400aa6f7-63fa-cc3f-8563-dc071d4fcba7-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">MANAGERS</div><a href="/products/vantage" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Vantage</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Cloud</div></div></a><a href="/products/central-management-console" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Central Management Console</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">On prem</div></div></a><div class="nav-link-list-small-header nav-link-list-small-header---next">SENSORS</div><a href="/products/guardian" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Guardian</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Network</div></div></a><a href="/products/guardian-air" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Guardian Air</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Wireless</div></div></a><a href="/products/arc" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Arc</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Endpoint</div></div></a><div class="nav-link-list-small-header nav-link-list-small-header---next">ENHANCEMENTS</div><a href="/products/vantage-iq" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Vantage IQ</div></a><a href="/products/asset-intelligence" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Asset Intelligence</div></a><a href="/products/threat-intelligence" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Threat Intelligence</div></a><a href="/products/smart-polling" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Smart Polling</div></a></div></div><div id="w-node-d93d606f-7616-665b-d9d6-f2be7c09df30-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df4835368816567937004_nozomi-platform-menu-icon-2.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header">Professional Services</h3><p class="nozomi-mega-menu-white-box-paragraph">OT and IoT security expertise that speeds solution deployment and maximizes value</p><a href="/professional-services" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-c4efda6a-2861-356b-d552-253f04d97b7b-30f70ec3" class="nav-dropdown-column-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">PROFESSIONAL <br/>SERVICES</div><a href="/professional-services/solution-design" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Design</div></a><a href="/professional-services/solution-deployment" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Deployment</div></a><a href="/professional-services/fast-track-service-packages" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Fast Track</div></a><a href="/professional-services/solution-optimization" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Optimization</div></a><a href="/professional-services/project-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Project Management</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="e1a612db-5ef3-2e1e-ef70-834ad7caa020" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Solutions</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-solutions"><div id="w-node-e1a612db-5ef3-2e1e-ef70-834ad7caa030-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bf62bc558e18211b85_nozomi-solutions-menu-icon-1.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">BUSINESS NEED</div></div><a href="/solutions/iot-ot-asset-inventory-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Asset Inventory Management</div></a><a href="/solutions/threat-detection-and-response" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Threat Detection &amp; Response</div></a><a href="/solutions/iot-ot-network-monitoring" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Continuous Network Monitoring</div></a><a href="/solutions/iot-ot-vulnerability-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Risk &amp; Vulnerability Management</div></a><a href="/solutions/iot-security" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">IoT Security</div></a><a href="/solutions/data-center-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Data Center Cybersecurity</div></a><a href="/solutions/building-automation-system-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Building Automation System<br/>Cybersecurity</div></a></div></div><div id="w-node-f086dac4-d3e5-963f-9b8e-0ff111f5ae9d-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper industry-nav-link-list-small-header"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bf74ced86d0dc1c29c_nozomi-solutions-menu-icon-3.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">INDUSTRY</div></div><div class="nav-link-list-two-column-wrapper w-row"><div class="w-col w-col-6 w-col-stack"><a href="/industries/airport-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Airports</div></a><a href="/industries/electric-utilities-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Electric Utilities</div></a><a href="/industries/federal-government" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Federal Government</div></a><a href="/industries/healthcare-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Healthcare</div></a><a href="/industries/manufacturing-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Manufacturing</div></a><a href="/industries/maritime-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Maritime</div></a><a href="/industries/mining-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Mining</div></a></div><div class="column-3 w-col w-col-6 w-col-stack"><a href="/industries/oil-gas-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Oil &amp; Gas</div></a><a href="/industries/pharmaceutical-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Pharmaceutical</div></a><a href="/industries/rail-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Rail</div></a><a href="/industries/retail-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Retail</div></a><a href="/industries/smart-cities-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Smart Cities</div></a><a href="/industries/stadiums-arenas" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Stadiums &amp; Arenas</div></a><a href="/industries/water-wastewater-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Water &amp;<br/>Wastewater</div></a></div></div></div></div><div id="w-node-_6cc7f1ae-788f-64bd-f869-1683ba23c206-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bfb032786965be445e_nozomi-solutions-menu-icon-2.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">COMPLIANCE</div></div><a href="/compliance/isa-iec-62443-standards" aria-current="page" class="nav-link-list-link w-inline-block w--current"><div class="nav-list-link-text">ISA/IEC 62443 Standards</div></a><a href="/compliance/nerc-cip" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">NERC CIP</div></a><a href="/compliance/nis2-directive-compliance" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">NIS2 Directive</div></a><a href="/compliance/sec-cybersecurity-rules" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">SEC Cybersecurity Rules</div></a><a href="/compliance/tsa-security-directives" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">TSA Security Directives</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="9a7c8e13-35ed-5514-55fe-acbc3f5fa706" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Partners</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-partners"><div id="w-node-_73cd8bf4-a1be-55e6-0b6d-dc5f9a824c35-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfde6427cc3addfcd2765_nozomi-partners-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Why Partner with Us</h3><p class="nozomi-mega-menu-white-box-paragraph">Our global partner network deploys OT &amp; IoT cybersecurity solutions for customers around the world.</p><a href="/partners" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_9a7c8e13-35ed-5514-55fe-acbc3f5fa70c-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt="" class="partner-menu-icon-1"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Our Partners</h3><p class="nozomi-mega-menu-white-box-paragraph">Explore all Nozomi Networks partners</p><a href="/partners#our-partners" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_22c9ad28-eba7-dea8-6747-bc706e91b27b-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65df8146636482acba9ef204_partner-search-icon.svg" loading="lazy" alt="" class="partner-mega-menu-icon-med"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Find a Partner</h3><p class="nozomi-mega-menu-white-box-paragraph">Find a certified Nozomi Networks partner in your country.</p><a href="/partners/find-a-partner" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-b6981566-e6b8-35f7-7a13-38fef51a2191-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64d507342134d4fe7e42c63f_NN-Icons-3-Colors-400x400px_laptop-140.svg" loading="lazy" alt="" class="partner-portal-icon partner-portal-icon-lg"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Partner Portal</h3><p class="nozomi-mega-menu-white-box-paragraph">Log into the Nozomi Networks partner portal.</p><a href="https://partners.nozominetworks.com/English/" target="_blank" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Log In</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="7d3ce5f9-6240-b523-6112-039ee7d7c514" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Resources</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-resources-grid"><div id="w-node-c0f1f060-a76b-da20-975b-6301dc235111-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e083e33848493787fd49d_nozomi-resources-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Resource Library</h3><p class="nozomi-mega-menu-white-box-paragraph">Browse OT &amp; IoT security research, guides, videos and more from the Nozomi Networks team.</p><a href="/resources" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">View Resources</div></a></div></div><div id="w-node-b95a8b1c-9b8b-0bf5-6bcc-881812dba420-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-resources-columns-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">RESOURCES</div><div class="nav-link-list-two-column-wrapper w-row"><div class="nav-menu-resources-column-1 w-col w-col-6"><a href="/case-studies" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Case Studies</div></a><a href="/content-packs" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Content Packs</div></a><a href="/data-sheets" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Data Sheets</div></a><a href="/guides" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Guides </div></a><a href="/podcasts" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Podcasts</div></a></div><div class="column-4 w-col w-col-6"><a href="/research-reports" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Research Reports</div></a><a href="/solution-briefs" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Solution Briefs</div></a><a href="/videos" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Videos</div></a><a href="/webinars" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Webinars</div></a><a href="/white-papers" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">White Papers</div></a></div></div></div></div><div id="w-node-_75fdf6f2-5fd5-5484-f185-d94876eefc91-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Customer Hub</h3><p class="nozomi-mega-menu-white-box-paragraph">Explore our latest customer resources, including webinars, how-to videos, content packs and more.</p><a href="/customer-resources" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">View Hub</div></a></div></div></div></nav></div><a href="/blog" class="top-nav-link-block w-inline-block"><div class="nav-toggle">Blog</div></a><div data-hover="false" data-delay="0" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Company</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-company"><div id="w-node-_521dd46f-a407-64a5-dd19-ffaa1e9ebfbe-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">About Nozomi Networks</h3><p class="nozomi-mega-menu-white-box-paragraph">We keep critical infrastructure and operational technology cyber resilient.</p><a href="/company" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_521dd46f-a407-64a5-dd19-ffaa1e9ebfc8-30f70ec3" class="nav-dropdown-column-wrapper"><div class="nav-link-list-dropdown-wrapper nav-icon-links-grid-wrapper"><div class="nav-icon-links-column-wrapper w-row"><div class="w-col w-col-6"><a href="/company/leadership" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64c93675ed962a0e3b6e45d8_leadership-team-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Leadership Team</div></a><a href="/events" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df71e33d8cb8245cbe7_%20events-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Events</div></a><a href="/company/newsroom" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7bb1169138c54ebc8_newsroom-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Newsroom</div></a></div><div class="w-col w-col-6"><a href="/company/careers" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7e2340e9dfe2c628b_careers-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Careers</div></a><a href="/customer-testimonials" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7de423e6e0ba360c1_customer-testimonials.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Customer Testimonials</div></a><a href="/company/contact-us" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df87f088fba967ffc33_contact-us.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon contact-us-menu-icon"/><div class="nav-icon-links-text">Contact Us</div></a></div></div></div></div></div></nav></div><div class="search-bar-container search-bar-container-mobile-nav"><form action="/search" class="search search-bar-container-mobile-nav w-form"><input class="search-input new-search search-input-mobile-nav w-input" maxlength="256" name="query" placeholder="" type="search" id="search" required=""/><input type="submit" class="search-button new-search-button w-button" value=""/></form></div></nav><a href="/demo" class="nav-button hs-cta-trigger-button-hs-cta-trigger-button-152380361226 w-button">Request Demo</a><div class="menu-button w-nav-button"><div class="w-icon-nav-menu"></div></div></div></div></div></div><section class="solutions-page-hero-header nerc-cip-header"><div class="solutions-page-header-title-wrapper compliance-page-title-wrapper"><div class="solution-page-header-title-container"><h4 class="solution-page-header-title-pre-header">COMPLIANCE</h4><h1 class="solution-page-header-title-main-header"><strong>Applying the ISA/IEC 62443 Standards for IACS Security</strong></h1><div class="cta-2-buttons"><a href="/demo" target="_blank" class="nozomi-button nozomi-button-arrow w-button">See a Demo</a><div class="div-block-content-packs-see-all div-block-cta-blue-button"><a href="/resources/applying-isa-iec-62443-standards-with-the-nozomi-networks-platform" target="_blank" class="learn-more-button-2 content-packs-see-all-resources cta-blue-button cta-blue-button-mobile w-button">Download Mapping Guide</a></div></div></div></div></section><section class="solution-page-challenge-section"><div class="w-layout-blockcontainer solution-page-challenge-section-container w-container"><div class="solution-page-challenge-section-text-wrapper"><h2 class="solution-page-challenge-section-header"><strong>What Are the ISA/IEC 62443 Standards?</strong></h2><p class="solution-page-challenge-section-paragraph">The ISA/IEC 62443 series of standards was developed by the ISA99 Committee and the IEC Technical Committee 65/Working Group 10 to define requirements and processes for implementing and maintaining electronically secure IACS. These standards set best practices for security and provide a way to assess the level of security performance. <br/></p><p class="solution-page-challenge-section-paragraph">Maintaining compliance with <a href="/blog/isa-iec-62443-explained-best-practices-for-iacs-security" class="link-3">ISA/IEC 62443</a> can help reduce the likelihood of cyberattacks and help avoid serious regulatory, financial and safety consequences while ensuring that operations are achieving comprehensive levels of ICS and cyber-physical security.</p></div></div></section><section class="compliance-page-two-column-section"><div class="w-layout-blockcontainer compliance-page-two-column-wrapper w-container"><div class="compliance-page-two-column-section-left-column-wrapper iec-compliance-page-header"><h2 class="compliance-page-two-column-section-header"><strong class="bold-text-10">Which ISA/IEC 62443 Parts Does Nozomi Networks Support?</strong></h2><p class="compliance-page-two-column-section-paragraph">Our solution helps you implement Parts 2-1 and 3-3 of the standard.</p><a href="/resources/applying-isa-iec-62443-standards-with-the-nozomi-networks-platform" target="_blank" class="nozomi-button nozomi-button-arrow w-button">View ISA/IEC 62443 Mapping Guide</a></div><h2 class="compliance-two-column-table-header"><strong>Part 2-1: Risk Analysis</strong></h2><div class="columns-4 w-row"><div class="column-12 w-col w-col-5"><div class="compliance-page-two-column-section-right-column-wrapper"><div class="iec-two-column-list-wrapper"><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Risk Identification, Classification and Assessment</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.4</div></div><div class="compliance-page-two-column-section-list-item-description-text">Identify the industrial automation and control systems</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.5</div></div><div class="compliance-page-two-column-section-list-item-description-text">Develop simple network diagrams</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.6</div></div><div class="compliance-page-two-column-section-list-item-description-text">Prioritize systems</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.7</div></div><div class="compliance-page-two-column-section-list-item-description-text">Perform a detailed vulnerability assessment</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.9</div></div><div class="compliance-page-two-column-section-list-item-description-text">Conduct a detailed risk assessment</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.12</div></div><div class="compliance-page-two-column-section-list-item-description-text">Conduct risk assessments throughout the lifecycle of the IACS</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.13</div></div><div class="compliance-page-two-column-section-list-item-description-text">Document the risk assessment</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.2.3.14</div></div><div class="compliance-page-two-column-section-list-item-description-text">Maintain vulnerability assessment records</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3</div></div><div class="compliance-page-two-column-section-list-item-description-text">Addressing the Risks with Cybersecurity Management Systems</div></div><div class="compliance-page-two-column-section-list-item-block-copy-copy"><div class="compliance-page-two-column-section-list-item-blue-block-copy"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.3.6</div></div><div class="compliance-page-two-column-section-list-item-description-text">Protecting connections</div></div><div class="compliance-page-two-column-section-list-item-block-copy-copy"><div class="compliance-page-two-column-section-list-item-blue-block-copy"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.3.7</div></div><div class="compliance-page-two-column-section-list-item-description-text">Maintaining equipment assets</div></div><div class="compliance-page-two-column-section-list-item-block-copy-copy"><div class="compliance-page-two-column-section-list-item-blue-block-copy"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.4.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Employ isolation or segmentation on high-risk IACS</div></div></div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.4.3</div></div><div class="compliance-page-two-column-section-list-item-description-text">Block non-essential communications with barrier devices</div></div></div><div class="w-col w-col-7"><div class="compliance-page-two-column-section-right-column-wrapper"><div class="iec-two-column-list-wrapper"><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.5.7</div></div><div class="compliance-page-two-column-section-list-item-description-text">Change default passwords</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.6.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Authenticate all users before system use</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.6.3</div></div><div class="compliance-page-two-column-section-list-item-description-text">Require strong authentication methods for system administration and application configuration</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.6.6</div></div><div class="compliance-page-two-column-section-list-item-description-text">Develop a policy for remote login and connections</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.7.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Establish appropriate logical and physical permission methods to access IACS devices</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.4.2.1</div></div><div class="compliance-page-two-column-section-list-item-description-text">Managing IACS risk on an ongoing basis</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.3.2.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Employ a common set of countermeasures</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.4.3.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Develop and implement a change management system</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.4.3.7</div></div><div class="compliance-page-two-column-section-list-item-description-text">Establish and document a patch management procedure</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.4.5.1</div></div><div class="compliance-page-two-column-section-list-item-description-text">Implement an incident response plan</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.4.5.3</div></div><div class="compliance-page-two-column-section-list-item-description-text">Establish a reporting procedure for unusual activities and events</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.4.5.6</div></div><div class="compliance-page-two-column-section-list-item-description-text">Identify and response to incidents</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">4.3.4.5.7</div></div><div class="compliance-page-two-column-section-list-item-description-text">Identify failed and successful cyber security breaches</div></div></div></div></div></div><h2 class="compliance-two-column-table-header"><strong>Part 3-3: Systems security requirements and security levels</strong></h2><div class="columns-4 w-row"><div class="column-12 w-col w-col-5"><div class="compliance-page-two-column-section-right-column-wrapper"><div class="iec-two-column-list-wrapper"><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.1.1</div></div><div class="compliance-page-two-column-section-list-item-description-text">Human user identification and authentication</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.1.5</div></div><div class="compliance-page-two-column-section-list-item-description-text">Authenticator Management</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.1.6</div></div><div class="compliance-page-two-column-section-list-item-description-text">Wireless Access Management</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.1.7</div></div><div class="compliance-page-two-column-section-list-item-description-text">Strength of password-based authentication</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.1.8</div></div><div class="compliance-page-two-column-section-list-item-description-text">Public key infrastructure certificates</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.1.9</div></div><div class="compliance-page-two-column-section-list-item-description-text">Strength of public key authentication</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.1.11</div></div><div class="compliance-page-two-column-section-list-item-description-text">Access via untrusted networks</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Wireless use control</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.3</div></div><div class="compliance-page-two-column-section-list-item-description-text">Use control for portable and mobile devices</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.5</div></div><div class="compliance-page-two-column-section-list-item-description-text">Session lock</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.6</div></div><div class="compliance-page-two-column-section-list-item-description-text">Remote session termination</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.8</div></div><div class="compliance-page-two-column-section-list-item-description-text">Auditable events</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.9</div></div><div class="compliance-page-two-column-section-list-item-description-text">Audit storage capacity</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.11</div></div><div class="compliance-page-two-column-section-list-item-description-text">Timestamps</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.3.1</div></div><div class="compliance-page-two-column-section-list-item-description-text">Communications integrity</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.3.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Malicious code protection</div></div></div></div></div><div class="w-col w-col-7"><div class="compliance-page-two-column-section-right-column-wrapper"><div class="iec-two-column-list-wrapper"><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.2.8</div></div><div class="compliance-page-two-column-section-list-item-description-text">Human user identification and authentication</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.3.4</div></div><div class="compliance-page-two-column-section-list-item-description-text">Software and information integrity</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.3.5</div></div><div class="compliance-page-two-column-section-list-item-description-text">Input validation</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.3.8</div></div><div class="compliance-page-two-column-section-list-item-description-text">Session integrity</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.4.1</div></div><div class="compliance-page-two-column-section-list-item-description-text">Information confidentiality</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.4.3</div></div><div class="compliance-page-two-column-section-list-item-description-text">Use of cryptography</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.5.1</div></div><div class="compliance-page-two-column-section-list-item-description-text">Network segmentation</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.5.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Zone boundary protection</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.5.3</div></div><div class="compliance-page-two-column-section-list-item-description-text">General-purpose person-to-person communication restrictions</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.6.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Continuous monitoring</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.7.1</div></div><div class="compliance-page-two-column-section-list-item-description-text">Denial of service protection</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.7.2</div></div><div class="compliance-page-two-column-section-list-item-description-text">Resource management</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.7.4</div></div><div class="compliance-page-two-column-section-list-item-description-text">Control systems and recovery</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.7.5</div></div><div class="compliance-page-two-column-section-list-item-description-text">Emergency power</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.7.6</div></div><div class="compliance-page-two-column-section-list-item-description-text">Network and security configuration settings</div></div><div class="compliance-page-two-column-section-list-item-block"><div class="compliance-page-two-column-section-list-item-blue-block"><div class="compliance-page-two-column-section-list-item-block-text">3.3.7.8</div></div><div class="compliance-page-two-column-section-list-item-description-text">Control system component inventory</div></div></div></div></div></div></div></section><section class="tabs-detail-section"><div class="w-layout-blockcontainer tabs-detail-section-container w-container"><h2 class="tabs-detail-section-main-title">How Does Nozomi Networks Support ISA/IEC 62443 Compliance?</h2><div class="nozomi-tabs-wrapper"><div data-current="Tab 1" data-easing="ease" data-duration-in="300" data-duration-out="100" class="nozomi-tabs w-tabs"><div class="nozomi-tab-button-wrapper w-tab-menu"><a data-w-tab="Tab 1" class="nozomi-tabs-button w-inline-block w-tab-link w--current"><div>Asset Visibility &amp; Vulnerability Assessment</div></a><a data-w-tab="Tab 2" class="nozomi-tabs-button w-inline-block w-tab-link"><div>Continuous Monitoring &amp; Threat Detection</div></a><a data-w-tab="Tab 3" class="nozomi-tabs-button w-inline-block w-tab-link"><div>ISA/IEC 62443 Reporting</div></a></div><div class="w-tab-content"><div data-w-tab="Tab 1" class="nozomi-tabs-content-wrapper w-tab-pane w--tab-active"><div class="nozomi-tabs-content-item-wrapper"><div class="nozomi-tabs-content-column w-row"><div class="w-col w-col-5 w-col-stack"><div class="nozomi-tabs-content-left-column-wrapper"><div class="nozomi-tabs-content-left-column-header">Asset Visibility &amp; Vulnerability Assessment</div><p class="nozomi-tabs-content-left-column-description">Nozomi Networks’ automated asset identification saves time and helps achieve a centralized view of all your OT &amp; IoT assets.<br/><br/>Nozomi Networks’ comprehensive vulnerability analysis supports prioritized and efficient risk reduction efforts with actionable insights on remediation steps, patches and upgrades. <br/><br/></p><a href="/solutions/iot-ot-asset-inventory-management" target="_blank" class="learn-more-button w-button">Learn More</a></div></div><div class="w-col w-col-7 w-col-stack"><div class="nozomi-tabs-content-right-column-image-wrapper"><img sizes="(max-width: 479px) 76vw, (max-width: 767px) 82vw, (max-width: 991px) 83vw, (max-width: 1279px) 49vw, (max-width: 1919px) 50vw, 673px" srcset="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/664c9bde8946a9364114f9cb_Vantage-Vulnerabilities-Dashboard-NEW-p-500.webp 500w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/664c9bde8946a9364114f9cb_Vantage-Vulnerabilities-Dashboard-NEW-p-800.webp 800w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/664c9bde8946a9364114f9cb_Vantage-Vulnerabilities-Dashboard-NEW.webp 1080w" alt="Vantage vulnerability dashboard" src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/664c9bde8946a9364114f9cb_Vantage-Vulnerabilities-Dashboard-NEW.webp" loading="lazy" class="nozomi-tabs-content-screenshot-image"/></div></div></div></div></div><div data-w-tab="Tab 2" class="nozomi-tabs-content-wrapper w-tab-pane"><div class="nozomi-tabs-content-item-wrapper"><div class="nozomi-tabs-content-column w-row"><div class="w-col w-col-5 w-col-stack"><div class="nozomi-tabs-content-left-column-wrapper"><div class="nozomi-tabs-content-left-column-header">Continuous Monitoring &amp; Threat Detection</div><p class="nozomi-tabs-content-left-column-description">Our AI-driven network monitoring and threat detection quickly identifies any anomalous activity within OT and IoT environments to meet ISA/IEC 62433 monitoring requirements.</p><a href="/products/vantage" target="_blank" class="learn-more-button w-button">Learn more</a></div></div><div class="w-col w-col-7 w-col-stack"><div class="nozomi-tabs-content-right-column-image-wrapper"><img sizes="(max-width: 479px) 76vw, (max-width: 767px) 82vw, (max-width: 991px) 83vw, (max-width: 1279px) 49vw, (max-width: 1919px) 50vw, 673px" srcset="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection-p-500.webp 500w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection-p-800.webp 800w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection-p-1600.webp 1600w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection-p-2000.webp 2000w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection-p-2600.webp 2600w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection.webp 3024w" alt="Vantage alert" src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/655279fed9867151ecb7327a_OT%20Protocol%20Packet%20Injection.webp" loading="lazy" class="nozomi-tabs-content-screenshot-image"/></div></div></div></div></div><div data-w-tab="Tab 3" class="nozomi-tabs-content-wrapper w-tab-pane"><div class="nozomi-tabs-content-item-wrapper"><div class="nozomi-tabs-content-column w-row"><div class="w-col w-col-5 w-col-stack"><div class="nozomi-tabs-content-left-column-wrapper"><div class="nozomi-tabs-content-left-column-header">ISA/IEC 62443 Reporting</div><p class="nozomi-tabs-content-left-column-description"><br/>Our content packs feature makes it easy to measure compliance with standards and best practices, including ISA/IEC 62433. </p><a href="/resources/isa-iec-62443-content-pack" target="_blank" class="learn-more-button w-button">Download ISA Content Pack</a></div></div><div class="w-col w-col-7 w-col-stack"><div class="nozomi-tabs-content-right-column-image-wrapper"><img sizes="(max-width: 479px) 76vw, (max-width: 767px) 82vw, (max-width: 991px) 83vw, (max-width: 1279px) 49vw, (max-width: 1919px) 50vw, 673px" srcset="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65c3da8b0e7e9d9ffe22b009_ISA-IEC-Key-Finding-Screenshot-800x500-p-500.webp 500w, https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65c3da8b0e7e9d9ffe22b009_ISA-IEC-Key-Finding-Screenshot-800x500.webp 800w" alt="ISA IEC 62443 content pack" src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65c3da8b0e7e9d9ffe22b009_ISA-IEC-Key-Finding-Screenshot-800x500.webp" loading="lazy" class="nozomi-tabs-content-screenshot-image"/></div></div></div></div></div></div></div></div></div></section><section class="solutions-page-solution-section"><div class="w-layout-blockcontainer solutions-page-solution-section-container w-container"><div class="solution-page-solution-section-text-wrapper"><h2 class="solution-page-solution-section-main-header">Why Choose Nozomi Networks for ISA/IEC 62443 Compliance?</h2></div><div class="solution-page-solution-section-blocks-and-video-wrapper solution-page-solution-section-no-video"><div class="solution-page-solution-section-blocks-wrapper"><div class="solutions-page-solution-section-block-item compliance-page-item-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt="" class="compliance-page-item-box-icon"/><p class="compliance-page-item-box-header">Relationships</p><p class="compliance-page-item-box-paragraph">We truly value our customers and take pride in having the industry’s highest customer retention rate. But don’t take our word for it. Read why our customers rank us #1 on Gartner Peer Reviews <a href="/customer-reviews" target="_blank">here</a>.</p></div><div class="solutions-page-solution-section-block-item compliance-page-item-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/649ca1340e078740f20b7fce_compliance-box-icon-2.svg" loading="lazy" width="136" alt="" class="compliance-page-item-box-icon eye-icon"/><p class="compliance-page-item-box-header"><strong>OT Expertise </strong></p><p class="compliance-page-item-box-paragraph">Our solution was born in OT and supports hundreds of protocols for passive discovery, as well as <a href="/products/smart-polling">smart polling</a>, an <a href="/products/arc">endpoint security sensor</a>, and a <a href="/products/guardian-air">wireless monitoring sensor</a>, making the flexibility and depth of our asset management and anomaly detection capabilities unmatched.</p></div><div class="solutions-page-solution-section-block-item compliance-page-item-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/649ca13422014db474f2ed14_compliance-box-icon-3.svg" loading="lazy" alt="" class="compliance-page-item-box-icon"/><p class="compliance-page-item-box-header">Robust Data Reporting</p><p class="compliance-page-item-box-paragraph">Our Dashboards and Content Packs allow users to quickly create a shareable format for the data they need to benchmark progress when applying the ISA/IEC 62443 standards in their OT environments.</p></div></div><div class="solution-page-solution-section-button-wrapper"><a href="/customer-testimonials" target="_blank" class="nozomi-button nozomi-button-arrow w-button">View Customer Testimonials</a></div></div></div></section><section class="related-resources-section"><div class="w-layout-blockcontainer related-resources-section-container w-container"><div class="related-resources-section-header-wrapper"><h2 class="related-resources-section-main-title">Other Resources for You</h2></div><div class="related-resources-section-resource-grid"><div id="w-node-ae0d01b1-c183-d6fd-65e0-45497f4cb422-2a8d1277" class="related-resources-section-grid-item-wrapper"><div class="related-resources-section-grid-item-columns w-row"><div class="w-col w-col-4"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65c3da8bf24d5b4d77b041a1_iot-ot-asset-inventory-management-143x143.webp" loading="lazy" alt="" class="related-resources-section-grid-item-image"/></div><div class="w-col w-col-8"><div class="related-resources-section-grid-item-title-wrapper"><div class="related-resources-section-grid-item-pre-header">SOLUTION</div><h3 class="related-resources-section-grid-item-title">OT Asset Inventory Management</h3><a href="/solutions/iot-ot-asset-inventory-management" target="_blank" class="learn-more-button w-button">Read</a></div></div></div></div><div id="w-node-_28f879f7-8dfe-33af-58fd-db7deed08d05-2a8d1277" class="related-resources-section-grid-item-wrapper"><div class="related-resources-section-grid-item-columns w-row"><div class="w-col w-col-4"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/649ca2e5afb507723f45285c_shutterstock_1092586049%20copy2.webp" loading="lazy" alt="" class="related-resources-section-grid-item-image"/></div><div class="w-col w-col-8"><div class="related-resources-section-grid-item-title-wrapper"><div class="related-resources-section-grid-item-pre-header">PRODUCT</div><h3 class="related-resources-section-grid-item-title">Platform Overview</h3><a href="/products" target="_blank" class="learn-more-button w-button">View</a></div></div></div></div><div id="w-node-ccf82df1-494a-954e-09cc-6eb71cfd1bbb-2a8d1277" class="related-resources-section-grid-item-wrapper"><div class="related-resources-section-grid-item-columns w-row"><div class="w-col w-col-4"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65c3da8b97f1a04824508feb_ISA-IEC-143x143.webp" loading="lazy" alt="" class="related-resources-section-grid-item-image"/></div><div class="w-col w-col-8"><div class="related-resources-section-grid-item-title-wrapper"><div class="related-resources-section-grid-item-pre-header">Guide</div><h3 class="related-resources-section-grid-item-title">ISA/IEC 62443 Mapping Guide</h3><a href="/resources/applying-isa-iec-62443-standards-with-the-nozomi-networks-platform" target="_blank" class="learn-more-button w-button">Read</a></div></div></div></div><div id="w-node-_8c40df42-d940-0672-9814-da8c1e49eb01-2a8d1277" class="related-resources-section-grid-item-wrapper"><div class="related-resources-section-grid-item-columns w-row"><div class="w-col w-col-4"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/649ca2e5c068a6aab7ff9cd4_c4946949e0204e3f843d2c7eeec143bf.webp" loading="lazy" alt="Nozomi Networks graph" class="related-resources-section-grid-item-image"/></div><div class="w-col w-col-8"><div class="related-resources-section-grid-item-title-wrapper"><div class="related-resources-section-grid-item-pre-header">VIDEO</div><h3 class="related-resources-section-grid-item-title">Nozomi Networks Platform Demo</h3><a href="/resources/nozomi-networks-platform-demo" target="_blank" class="learn-more-button w-button">Watch</a></div></div></div></div></div></div></section><section class="next-step-section"><div class="next-step-container w-container"><h2 class="header header-centered next-step-header">Take the next step.</h2><div class="next-step-paragraph-wrapper"><p class="next-step-paragraph">Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.</p></div><div class="next-step-buttons-wrapper"><a href="/demo" class="nozomi-button nozomi-button-arrow nozomi-button-next-step w-button">Request a Demo</a><a href="/resources/nozomi-networks-platform-demo" class="nozomi-button nozomi-button-arrow nozomi-button-inverse nozomi-button-next-step w-button">Watch Demo</a></div></div></section><section class="footer"><div id="subscribe" class="footer-subscribe-wrapper"><div class="footer-subscribe-container"><div class="footer-subscribe-embed-box w-embed w-script"><script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script> <script> hbspt.forms.create({ region: "na1", portalId: "2724979", formId: "a03466a4-e367-45ac-8a9f-8739114a494c" }); </script> <div style="max-width: 350px; margin-left: 0; margin-right: auto; padding-top: 5px;"><a href="https://www.nozominetworks.com/legal/privacy-policy" target="_blank" style="font-size: 10px; line-height: 18px; color: #F5F5F7; font-family: Montserrat;">View our Privacy Policy</a></div></div></div></div><div class="footer-top-navigation-bar"><div class="footer-container footer-link-bar-container w-container"><div class="footer-top-navigation-bar-wrapper"><div class="footer-navigation-logo-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0bbe5862d58545496b67_nozomi-blue-icon.svg" loading="lazy" alt="" class="image"/></div><a data-w-id="63fd2949-137e-d5f8-88d1-14e184102f83" href="#" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">Subscribe</h2></a><a href="https://www.linkedin.com/company/nozomi-networks-sa" target="_blank" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">LinkedIn</h2></a><a href="/demo" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">Demo</h2></a></div></div></div><div class="footer-navigation-link-field-wrapper"><div class="footer-container w-container"><div class="w-layout-grid footer-link-field-grid"><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102f8f-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">PLATFORM</h3><a href="/products" class="footer-link">Platform Overview</a><a href="/products/vantage" class="footer-link">Vantage</a><a href="/products/central-management-console" class="footer-link">Central Management Console</a><a href="/products/guardian" class="footer-link">Guardian</a><a href="/products/guardian-air" class="footer-link">Guardian Air</a><a href="/products/arc" class="footer-link">Arc</a><a href="/products/asset-intelligence" class="footer-link">Asset Intelligence</a><a href="/products/threat-intelligence" class="footer-link">Threat Intelligence</a><a href="/products/smart-polling" class="footer-link">Smart Polling</a><a href="https://security.nozominetworks.com/" target="_blank" class="footer-link">PSIRT</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fa0-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Professional Services</h3><a href="/professional-services" class="footer-link">Overview</a><a href="/professional-services/solution-design" class="footer-link">Design</a><a href="/professional-services/solution-deployment" class="footer-link">Deployment</a><a href="/professional-services/fast-track-service-packages" class="footer-link">Fast Track</a><a href="/professional-services/solution-optimization" class="footer-link">Optimization</a><a href="/professional-services/project-management" class="footer-link">Project Management</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fad-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Business needs</h3><a href="/solutions/threat-detection-and-response" class="footer-link">Threat Detection &amp; Response</a><a href="/solutions/iot-ot-network-monitoring" class="footer-link">Continuous Network Monitoring</a><a href="/solutions/iot-ot-asset-inventory-management" class="footer-link">Asset Inventory Management</a><a href="/solutions/iot-ot-vulnerability-management" class="footer-link">Risk &amp; Vulnerability Management</a><a href="/solutions/iot-security" class="footer-link">IoT Security</a><a href="/solutions/data-center-cybersecurity" class="footer-link">Data Center Cybersecurity</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fbc-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Compliance</h3><a href="/compliance/nerc-cip" class="footer-link">NERC CIP</a><a href="/compliance/nis2-directive-compliance" class="footer-link">NIS2 Directive</a><a href="/compliance/tsa-security-directives" class="footer-link">TSA Security Directives</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fc9-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Industry</h3><a href="/industries/airport-cybersecurity" class="footer-link">Airports</a><a href="/industries/electric-utilities-cybersecurity" class="footer-link">Electric Utilities</a><a href="/industries/healthcare-cybersecurity" class="footer-link">Healthcare</a><a href="/industries/federal-government" class="footer-link">Federal Government</a><a href="/industries/manufacturing-cybersecurity" class="footer-link">Manufacturing</a><a href="/industries/maritime-cybersecurity" class="footer-link">Maritime</a><a href="/industries/mining-cybersecurity" class="footer-link">Mining</a><a href="/industries/oil-gas-cybersecurity" class="footer-link">Oil &amp; Gas</a><a href="/industries/pharmaceutical-cybersecurity" class="footer-link">Pharmaceutical</a><a href="/industries/rail-cybersecurity" class="footer-link">Rail</a><a href="/industries/retail-cybersecurity" class="footer-link">Retail</a><a href="/industries/smart-cities-cybersecurity" class="footer-link">Smart Cities</a><a href="/industries/water-wastewater-cybersecurity" class="footer-link">Water &amp; Wastewater</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fe4-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Learn</h3><a href="/partners" class="footer-link">Partners</a><a href="/resources" class="footer-link">Resources</a><a href="/company" class="footer-link">Company</a><a href="/company/contact-us" class="footer-link">Contact Us</a><a href="/academy" class="footer-link">Academy</a><a href="/company/careers" class="footer-link">Careers</a><a href="/labs" class="footer-link">Labs</a><a href="https://www.nozominetworks.com/legal/privacy-policy" class="footer-link">Legal</a><div class="footer-social-icon-wrapper"><a href="https://twitter.com/nozominetworks" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64e91608e818b441814b52e8_twitter_footer_22x18.svg" loading="lazy" width="42" height="100" alt="" class="footer-social-icon"/></a><a href="https://www.linkedin.com/company/nozomi-networks-sa" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0f5111954ec5d275cd99_linkedin.svg" loading="lazy" alt="Linkedin logo" class="footer-social-icon"/></a><a href="https://www.youtube.com/@nozominetworks" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0f5133e547a9cb765948_youtube.svg" loading="lazy" alt="" class="footer-social-icon"/></a></div></div></div></div></div><div class="footer-copyright-wrapper"><div class="footer-container w-container"><div class="footer-copyright-text">© 2024 Nozomi Networks Inc. All Rights Reserved. <a href="https://www.nozominetworks.com/legal/privacy-policy" target="_blank" class="footer-copyright-link">Privacy Policy</a> and Certifications. <a href="#" class="footer-copyright-link">System Status</a>.</div></div></div></section><script src="https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=645a4534705010e2cb244f50" type="text/javascript" integrity="sha256-9/aliU8dGd2tb6OSsuzixeV4y/faTqgFtohetphbbj0=" crossorigin="anonymous"></script><script src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/js/nozomi-2023.3991b2fee.js" type="text/javascript"></script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10