What is NP-View?
OT Network Security Solution
NP-View takes essential auditing technology and makes it continuous for proactive OT network security that builds cyber resiliency.
NP-View creates intuitive topological maps that serve as a GPS for both technical and non-technical users, providing a unified ruleset review and insight into how to ensure network security.
Values of the NP-View Platform

Instant Ruleset Review
NP-View allows generating, sorting, customizing, and exporting reports of all rules for supported devices in the solution.
Learn More
Automated NERC CIP Reports
Save time with NP-View's automated reports for CIP-005 and CIP-003 audits. Identify interactive remote access with path analysis.
Learn More
Topology Mapping
Visualize your network through a top down view. NP-View’s most intuitive feature lets users arrange their network view for efficient network upkeep.
Learn More
Actionable Risk Assessment
NP-View proactively ensures device compliance and security, allowing users to review and determine actions to mitigate risks within the platform.
Learn More
Attack Simulation
NP-View's stepping stone analysis shows the potential paths an asset can reach in the network, if it were to be infiltrated.
Learn More
Automated Import
NP-View can automatically retrieve configuration files from network devices, network management systems, and file shares on a custom schedule.
Learn MoreNP-View Demo
“NP-View is exactly what we needed. Internally, we can design network diagrams, track equipment inventory, and monitor configurations from switches, routers, and firewalls.”
— Todd Chwialkowski, Senior NERC Compliance Specialist, EDF Renewables
Full Case Study
Network Topology Map Accurate View of Your Network
|
|
![]() |
“We would generate a lot of spreadsheets and Visio diagrams to demonstrate that our networks were compliant, but Network Perception’s NP-View is basically what’s used by the auditors, so we figured if that’s what they use, that’s what we wanted to use as well.”
— David Fletcher, Lead Cybersecurity Analyst, PSEG
Full Case Study
Ruleset Review Save Time Auditing Your Firewalls
|
|
![]() |