• Skip to Main Navigation
  • Skip to Main Content
  • Skip to Footer
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try

Exposure Management

Manage cyber risk with one platform to find, prioritize and eliminate exposures across your attack surface.
Find out more
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try
Exposure Management
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
  • Customers
  • Wärtsilä
Case study

Wärtsilä Wärtsilä


The visibility Tenable OT Security delivers helps our customers protect critical infrastructure and adhere to regulations and compliance requirements in a forthright and measured way.

Ross Bailey, Cyber Security Expert, Wärtsilä

Download the case study
Primary product used

Tenable OT Security


The unified security solution for converged OT/IT environments

Tenable OT Security is a security solution that helps organizations protect their industrial networks from cyber threats, malicious insiders, and human error. It provides visibility into IT, OT, and IoT assets, and helps organizations prioritize cybersecurity risks.

Explore this product Request a demo
Industry: Marine and energy
Location: Finland
Revenue: EUR 5.8 billion

Wärtsilä gives customers OT visibility to protect critical infrastructures with Tenable OT Security

Marine and energy innovator, Wärtsilä, is managing its operational technology (OT) asset inventory collection and providing holistic visibility into its OT environment using Tenable OT Security. The deployment allows Wärtsilä to answer its customers’ questions around asset delivery, reducing supply chain risks and taking a proactive stance on cybersecurity.

“The visibility Tenable OT Security delivers helps our customers protect critical infrastructure and adhere to regulations and compliance requirements in a forthright and measured way.” That’s how Wärtsilä’s Cyber Security Expert, Ross Bailey, describes the value of Tenable OT Security’s automated asset discovery to its suppliers and customers.

Spreadsheets and manual data entry led to errors and compliance challenges

A global leader in innovative technologies and lifecycle solutions for the marine and energy markets, Wärtsilä emphasizes innovation in sustainable technology and services to help its customers continuously improve environmental and economic performance.

Building a modern power plant or marine vessel requires hardware and software solutions from a variety of suppliers. Customers need to understand every component, down to the firmware and serial number. Adding to the urgency, the European Cyber Resilience Act (CRA) will impose cybersecurity obligations on all devices that have a network connection.

Key business needs

Wärtsilä set out to address these challenges by creating automated asset inventory collection, streamlining compliance reporting, and enabling OT vulnerability reporting.

In the past, the suppliers who installed the equipment for Wärtsilä’s customers created an asset list in an Excel spreadsheet. The manual process was time consuming, error prone, and only relevant for a specific point in time. Technicians had to merge files when new devices were added.

Wärtsilä needed to make the process easy, repeatable, and always up to date for its customers.

Tenable OT Security automates asset discovery and visualization at scale

Tenable OT Security enables Wärtsilä to identify assets, communicate risk and prioritize action all while enabling its IT and OT teams to work better together. Knowing exactly which assets exist, their configurations and full situational awareness of both sides of the house, empowers the security team to see and understand the big picture.

According to Bailey, Wärtsilä tested several vendor technologies before selecting Tenable OT Security.

“Many of these asset management tools are passive – they sniff the network by looking at the traffic at the mirror port and using that information to decipher assets. Tenable uses a proprietary approach to query devices in a safe way, PLCs for example, to get rich asset information. And that’s where it really shined for us,” says Bailey.

Tenable OT Security’s automated asset discovery and visualization capabilities provide a comprehensive, up-to-date inventory of all assets. This includes workstations, servers, human machine interfaces (HMIs) and programmable logic controllers (PLCs), including dormant devices that do not communicate frequently over the network. The latter it uncovers by leveraging its patented active querying capabilities. The results are detailed device information,such as firmware and OS versions, internal configurations, and serial numbers.

Wärtsilä is preparing itself and its customers to operate in a new regulatory landscape. “With regulations like the Cyber Resilience Act coming into law, the need to disclose real-time vulnerability information in a short amount of time adds a huge challenge we'd not be able to meet without a solution like Tenable OT Security,” says Bailey.

As Wärtsilä rolls out the Tenable OT Security solutions across its dynamic environment, the partnership with the Tenable team has been crucial for a successful deployment.

“The great thing about using Tenable OT Security is working with the Tenable people,” says Bailey. “They have great technical expertise, appropriately sizing our environment and positioning us to scale as our licensing needs grow.”

Wärtsilä helps customers visualize asset inventory and protect key infrastructures

Now, Wärtsilä has the capabilities to deliver a complete asset inventory to its customers. During site acceptance testing, Tenable OT Security is integrated with each customer’s environment to provide a way to scan the project delivery and existing assets to obtain a complete asset inventory, as well as allow manual asset enrichment for legacy devices. This improved visibility helps customers protect critical infrastructure while meeting compliance requirements.

“There is no silver bullet when asset scanning in an OT environment – you can’t get to 100 percent. Some of these old devices are not compatible with any proprietary protocols or even Simple Network Management Protocol,” says Bailey. “A flexible tool like Tenable OT Security, which allows for manual asset enrichment, is essential.”

Wärtsilä is also helping its customers save time and increase productivity. Before integrating Tenable OT Security, the asset inventory was tedious and time consuming, taking, on average, two technicians around seven hours per installation. Automated processes help technicians work more efficiently, which increases the number of completed installations each day, with improved accuracy.

“Automating the asset inventory process saves Wärtsilä’s suppliers several hours of tedious work, while improving the accuracy of the inventories for customers,“ says Bailey. “With fewer errors and more consistency in the data, Wärtsilä is able to standardize and normalize the data.”

Tenable OT Security can also create an asset map based on what it senses on the network. As various OT assets “talk” to each other across the network, Tenable OT Security uses that information to gather valuable context. How are the assets connected? What else are they connected to? How are these assets related to one another?

"Our vision is to use Tenable OT Security to create a digital twin – a 3D map of how devices are connected and snapshots of all configuration changes – with near real-time asset visibility,” adds Bailey. “In the past, we've done it on an adhoc basis, but the data is only good for that point in time, the process is time consuming, and we may not get all of the device context we need."

In addition to providing customers with complete and accurate asset inventories, Tenable is enabling Wärtsilä to develop new services that help customers visualize their OT environment. Tenable Security Center, a vulnerability reporting engine that gathers and evaluates vulnerability data distributed across the enterprise, will enable rich reports that illustrate vulnerability trends over time, allowing Wärtsilä’s customers to assess risk and prioritize vulnerabilities.

“In the future, we will install Tenable Security Center and provide a dashboard and reports to customers through a service we’re calling the ‘Asset Visualization Service’. When customers don’t know what assets they have, we can provide an inventory and a vulnerability report,” says Bailey.

Read the press release about how Wärtsilä is Solving OT Asset Management challenges for its energy customers.

Back to Top

  • Tenable OT Security

Related customer case studies

TechMatrix


Read case study

Continental AG


Read case study

Major US Telecommunications Company


Read case study

Explore all case studies ›

Your exposure ends here.

Partners

  • Become a partner
  • Find a partner
  • Partner portal
  • Partner programs

Resources

  • Services
  • Technical support
  • Training and certifications
  • Product documentation
  • Customer community
  • Tenable Trust

Company

  • About us
  • Executive team
  • Newsroom
  • Investor relations

Connect

  • Contact us
  • Try our product
  • Chat with sales
  • Meet us at an event
  • Join us
  • Privacy policy
  • Do not sell/share my personal information
  • Legal
  • 508 compliance

© 2026 Tenable®, Inc. All rights reserved

Tenable One

Request a demo

The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One.
A representative will be in touch soon.

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

Request a demo

Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable One Cloud Exposure.
A representative will be in touch soon.

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

Request a demo

Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center.
A representative will be in touch soon.

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

Request a demo

Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management.
A representative will be in touch soon.

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

Request a demo

Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security.
A representative will be in touch soon.

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

Request a demo

Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable One Attack Surface Management.
A representative will be in touch soon.

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

Request a demo

See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable One AI Exposure.
A representative will be in touch soon.

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

Request a demo

Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable One OT Exposure.
A representative will be in touch soon.

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

Request a demo

Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable One Identity Exposure.
A representative will be in touch soon.

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

Why Tenable

See Tenable in action

Want to see how Tenable can help your team find and fix critical cyber weaknesses that put your business at risk? Complete this form to get a custom quote or demo.

Thank you for subscribing!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank You

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

Subscribe

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Thank you for subscribing!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

Try for free

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.


Buy now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Number of assets

100

Choose your subscription

Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management.
A representative will be in touch soon.

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

Try for free

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy now

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

FQDNs

5
$3,578
Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning.
A representative will be in touch soon.

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

Try for free

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Fill out the form below to continue with a Nessus Pro trial.

Buy now

Buy Tenable Nessus Professional

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

*VAT incl.

Try for free

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional? Upgrade to Nessus Expert free for 7 days.

Buy now

Buy Nessus Expert


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.