Asset details are convenient because I have lots of information with respect to assets. Whenever I receive any alert, I check what the asset is about. For example, with any incident such as network scanning or multiple successful logins, there are all the details regarding what happened. It tells me what the possible cause was and what the solution will be. The details show what source is involved, what site and zone, what label, IP or MAC address, what ports are involved, TCP/IP or any other protocols. I can see if there is any user assigned to it with respect to site spokes. I can see the destination and all those destination site details. I can determine if it is internal traffic, external traffic going out from IT to OT, or traffic from any other site or any external devices. I can see what communication protocol is being used, the transport protocol, the threat severity, the network exposure, and the attack tactics. All these details are available. I have additional details such as when the attack happened or when the incident was reported, how the device was captured, which port it was detected on, and whether it is an easy attack that is not relevant so I can acknowledge it or trigger it. I have timeline details and can also leave comments about whether something is recurring so I can ignore certain attacks or incidents. All these details provide a proper audit trail for companies. For customer support, I would rate it at eight point five out of ten. I would also rate the overall product experience at eight point five. I would rate Nozomi Networks at nine points overall. When looking at the OT monitoring tool market, Nozomi Networks wins. Nozomi Networks and Claroty are both excellent solutions, which is why I rate it as nine out of ten.
Country Sales Manager at a computer software company with 51-200 employees
Real User
Top 20
Feb 17, 2026
I assess the impact of potential threats detected by Nozomi Networks as high because it is mostly deployed in critical infrastructure. It is a very critical technology that customers are using to be safe, ensuring business continuity, and that matters most for the industry. Given my very rich experience with Nozomi Networks technologies, I would advise organizations considering it to look primarily into ICS system cybersecurity and IoT. They can also enhance their focus on enterprise IT security. I rate this product an eight out of ten.
The operational and technical architects, NOC, and SOC teams usually use nodes to detect and remediate firewall issues. They prefer not to analyze the environment more deeply. Instead, they rely on alerts about threats or suspicious, malicious traffic flow in their network devices. I would recommend it because it is easy to install and develop. It provides a deep analysis of devices, which helps manage security reviews and ensure compliance. Overall, it is a good solution for these main purposes. I rate the overall product a nine out of ten.
Nozomi Networks enhances ICS and OT cybersecurity through threat detection, monitoring, and comprehensive asset management. Users value its real-time anomaly detection, advanced threat detection via machine learning, and intuitive interface, which streamline workflows and boost efficiency, ensuring compliance and robust network security.
Asset details are convenient because I have lots of information with respect to assets. Whenever I receive any alert, I check what the asset is about. For example, with any incident such as network scanning or multiple successful logins, there are all the details regarding what happened. It tells me what the possible cause was and what the solution will be. The details show what source is involved, what site and zone, what label, IP or MAC address, what ports are involved, TCP/IP or any other protocols. I can see if there is any user assigned to it with respect to site spokes. I can see the destination and all those destination site details. I can determine if it is internal traffic, external traffic going out from IT to OT, or traffic from any other site or any external devices. I can see what communication protocol is being used, the transport protocol, the threat severity, the network exposure, and the attack tactics. All these details are available. I have additional details such as when the attack happened or when the incident was reported, how the device was captured, which port it was detected on, and whether it is an easy attack that is not relevant so I can acknowledge it or trigger it. I have timeline details and can also leave comments about whether something is recurring so I can ignore certain attacks or incidents. All these details provide a proper audit trail for companies. For customer support, I would rate it at eight point five out of ten. I would also rate the overall product experience at eight point five. I would rate Nozomi Networks at nine points overall. When looking at the OT monitoring tool market, Nozomi Networks wins. Nozomi Networks and Claroty are both excellent solutions, which is why I rate it as nine out of ten.
I assess the impact of potential threats detected by Nozomi Networks as high because it is mostly deployed in critical infrastructure. It is a very critical technology that customers are using to be safe, ensuring business continuity, and that matters most for the industry. Given my very rich experience with Nozomi Networks technologies, I would advise organizations considering it to look primarily into ICS system cybersecurity and IoT. They can also enhance their focus on enterprise IT security. I rate this product an eight out of ten.
Nozomi Networks scores a nine out of ten overall. There is no perfect solution, but it is a solid choice for managing OT security.
I chose Nozomi because it is far ahead of other competitors, like Curator and Elastic. I would rate the overall solution nine out of ten.
I'd rate the solution seven out of ten.
I would recommend the solution to other users. Overall, I rate the solution ten out of ten.
The operational and technical architects, NOC, and SOC teams usually use nodes to detect and remediate firewall issues. They prefer not to analyze the environment more deeply. Instead, they rely on alerts about threats or suspicious, malicious traffic flow in their network devices. I would recommend it because it is easy to install and develop. It provides a deep analysis of devices, which helps manage security reviews and ensure compliance. Overall, it is a good solution for these main purposes. I rate the overall product a nine out of ten.
Overall, I rate Nozomi Networks a nine out of ten.
I would rate this solution 9 out of 10.