PUBLIC SECTOR

Cyber & Operational Resilience for State & Local Public Authorities

To provide essential services without disruption, public authorities must secure the critical infrastructure they operate — water and wastewater facilities, port authorities, public transportation and more — despite limited resources, tightly controlled rate increases and aging equipment. These cyber-physical systems make attractive targets for cyberattacks. They need CPS-focused protection.

The Nozomi Networks platform is purpose-built to protect the critical infrastructure that provides essential public services from cyber and operational risk.

It combines asset visibility, threat detection, continuous monitoring and AI-powered analysis to help public authorities increase resilience while meeting government regulations like NERC CIP and the TSA Security Directives.

Key State & Local Sectors That Need OT/ICS Security

Maritime Ports

Comply with USCG baseline cybersecurity requirements in response to increasing cyberattacks on digital ports that can reverberate through the supply chain.

Learn More

Water & Wastewater

Protect SCADA systems, PLCs, HMIs and other OT/ICS assets being targeted in pumping stations, treatment plants and remote facilities to maintain a safe water supply.

Learn More

Public Transportation

Protect traffic control and signaling systems, automated fare controls, CCTV cameras and more to detect tampering and ensure passenger safety.

Learn More

Airports

Detect threats and anomalies for everything from baggage handling to and instrument landing systems, promoting safe, reliable airport operations.

Learn More
KEY CAPABILITIES

Resilience, Security and Visibility for Any OT or IoT Device

100% Visibility

Automate asset inventory with safe, non-disruptive discovery methods for sensitive OT/IoT assets.

Learn More

Threat Detection & Response

Leverage signature, indicator, behavior and anomaly-based detection at the network and endpoint level to disrupt attacks.

Learn More

Continuous Monitoring

Capture network traffic and asset behavior changes with monitoring techniques purpose-built for industrial control systems.

Learn More

Vulnerability & Risk Management

Prioritize and accelerate remediation with actionable intelligence and playbooks to address the most critical issues first.

Learn More

Tap Funding to Secure Critical Infrastructure Through the State & Local Cybersecurity Grant Program

Through the Infrastructure Investment and Jobs Act of 2021, Congress established the State and Local Cybersecurity Grant Program (SLCGP) and appropriated $1 billion be allocated over four years to help state, local and territorial governments reduce systemic cyber risk, thus improving the security of critical infrastructure and improving the resilience of services. Jointly managed by the Cybersecurity and Infrastructure Security Agency (CISA) and Federal Emergency Management Agency (FEMA), the program is authorized for funding through FY 2025.

State Administrative Agencies (SAAs), including territorial governments, are eligible to receive grants. They must pass through 80% of awarded funds to local governments and 25% to rural areas. 

U.S. Government Certifications and Contract Vehicles

ISO 2013: 27001 Certified

Nozomi Networks' information security management systems are certified to manage and reduce identified risks to an acceptable level.

SOC 2 Type 1 & 2 Compliant

Nozomi Networks has certified the Vantage SaaS platform for SOC 2 Type 1 & 2.

FIPS 140-2 Compliant

The Nozomi Networks cryptographic modules are fully compliant with the FIPS 140-2 specifications from NIST.

We are currently working towards FedRAMP authorization with our federal agency sponsor.

The Nozomi Networks solution is currently available through Carahsoft on multiple contracts and purchasing schedules, including GSA, NASA SEWP, ITES.

Strategic Alliances to Serve the Federal Government

Strategic alliance Partners
Accenture Federal Services logo
Booz Allen logo
GDIT logo
Chinook logo
Schweitzer Engineering logo
Siemens logo
EY
SDA
Resellers
Nereus logo
Thundercat logo
Impres logo
Raventek
Asc3nd

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.