Homepage

The Leader in OT Cybersecurity

Our solution helps companies apply the 5 foundational security controls in their OT environments to reduce cyber risk by 85%.

LEARN MORE

Inventory of Hardware Assets

Create and maintain an accurate inventory of all hardware devices in your OT environments

Inventory of Software Assets

Create and maintain an accurate software inventory for the endpoints in your OT environments

Configuration Change Management

Monitor for any configuration changes in your hardware and software

Vulnerability Monitoring

Proactively identify and mitigate vulnerabilities to minimize the window of opportunity for attackers

Event Log Management

Create, maintain and monitor security event logs to help you detect and respond to a cyberattack

Industrial Defender manages your OT cybersecurity and compliance risk for assets across your industrial footprint.

  • L0: Equipment
  • L2/3: Control Room Building
  • L1: Controllers and I/Os
  • L2/3: Relay Switch Room
  • L4: Administrative Building
  • Third Party Vendor Access
  • Warehouse & Distribution Facilities
  • RTG Cranes
  • Ship to Shore Gantry Cranes
  • Ship Onboard Systems
  • L1/2: Controllers and I/O Room
  • L3.5: Plant administration
  • L0: Equipment
  • L3: Control Room
  • L4: Corporate HQ
  • Lighting System
  • Process Equipment
  • HVAC System
  • Distributed Control System
  • Energy System
  • Elevator Control Room
  • HVAC System
  • Corporate Network
  • VIDEO

    What Does Industrial Defender Do?

    FEATURES

    Manage all of your OT security tasks from one place.

    View Solution Brief
    View Solution Brief
    View Solution Brief
    View Solution Brief
    View Solution Brief
    View Solution Brief

    Our Partners

    Get Started with Your OT Security Project

    Take a guided tour of the product with one of our knowledgeable staff members.

    Asset
    Visibility & Management
    Vulnerability Management
    IT/OT Collaboration
    Compliance Reporting

    OT Cybersecurity Blog, News, and Events

    Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond

    Join us as we discuss what ICS security trends to expect this year, including which preventative controls organizations should adopt, what legislation and frameworks we might see from the government and more.

    3 Tips for Rail Operators to Get Started with ICS Cybersecurity

    To keep passengers and crew safe, transportation organizations must implement preventative cybersecurity measures to avoid cyberattacks. Here are 3 tips to get rail operators started with ICS security.

    EDR/MDR for OT

    How to Create an EDR/MDR Alternative for OT Systems

    To combat threats like ransomware, organizations must centralize detection and response efforts, but EDR/MDR solutions are not a good fit for operational technology. Learn about an EDR/MDR alternative for OT systems.

    Industrial Defender and BridgeWare Partner to Bring Operational Technology Cybersecurity to Korea

    Korean critical infrastructure companies will benefit from Industrial Defender’s comprehensive OT security and compliance platform as part of BridgeWare’s software offerings.

    Podcast: CS2AI Becoming an Effective Leader in Technology Control Systems

    In this episode of the (CS)²AI Podcast, Industrial Defender CEO Jim Crowley shares his fascinating journey into the world of cyber security. He explains the ingredients that contributed to Industrial Defender becoming a leader in the cybersecurity space.

    Video: Digital Anarchist Interviews CEO Jim Crowley On National Security Directive

    President Biden’s new national security directive aims to boost defenses against ransomware attacks and the hacking of critical infrastructure. In this video, Jim Crowley of Industrial Defender discusses what Biden’s new infrastructure and cybersecurity bill means for the industry.

    Cyber Senate Control Systems Cybersecurity Europe Conference

    We’re thrilled to be sponsoring the Cyber Senate Europe conference! Learn more about our new OT Machine Learning (OTML) Engine, powered by Splunk, which maps contextual OT endpoint and network data from Industrial Defender to Splunk’s extensive Machine Learning Toolkit algorithms.

    API Cybersecurity Conference

    We’re thrilled to sponsor API Cybersecurity Conference!

    S4x22

    We’re excited to be back at S4! Stay tuned for more details around Industrial Defender’s participation in speaking sessions and thought leadership.

    Podcast: CS2AI Becoming an Effective Leader in Technology Control Systems

    In this episode of the (CS)²AI Podcast, Industrial Defender CEO Jim Crowley shares his fascinating journey into the world of cyber security. He explains the ingredients that contributed to Industrial Defender becoming a leader in the cybersecurity space.

    Video: Digital Anarchist Interviews CEO Jim Crowley On National Security Directive

    President Biden’s new national security directive aims to boost defenses against ransomware attacks and the hacking of critical infrastructure. In this video, Jim Crowley of Industrial Defender discusses what Biden’s new infrastructure and cybersecurity bill means for the industry.

    Executive Q&A: Cyberattack Warnings and Trends

    Are cyberattacks more common over holiday weekends? What do you need to know about cybersecurity trends? Industrial Defender CEO Jim Crowley shared his insight with us.

    The Need to Protect Digital Infrastructure Highlights This ETF

    Building out digital infrastructure is one of the agendas in the trillion-dollar infrastructure plan that’s up for debate in the House of Representatives, but said infrastructure also needs to be protected.

    Don’t Let Cybercriminals Ruin your Merger or Acquisition–Follow This Expert’s Advice

    Companies are vulnerable to potential cyberthreats during mergers and acquisitions; learn from an expert why and how to reduce security risks during the transition.

    Russia, China, Cyber War, and Letters of Marque and Reprisal

    Industrial Defender CEO Jim Crowley was featured on Techspective.net this week, discussing the historical precedence for cybersecurity aggression by state actors like Russia and China.

    Industrial Defender and BridgeWare Partner to Bring Operational Technology Cybersecurity to Korea

    Korean critical infrastructure companies will benefit from Industrial Defender’s comprehensive OT security and compliance platform as part of BridgeWare’s software offerings.

    Industrial Defender Delivers Industry-First OT Machine Learning Engine Using Both Network and Endpoint Data

    Industrial Defender’s OTML supports machine learning at scale to mitigate cyber risks, including ransomware, for OT environments across the enterprise using Splunk’s Machine Learning Toolkit

    Industrial Defender and Fetch Automation Partner to Deliver Operational Technology Cybersecurity and Compliance Solutions for Australia

    Australian critical infrastructure companies will benefit from Industrial Defender’s comprehensive OT security and compliance platform as part of Fetch Automation’s software offerings.

    Industrial Defender Partners with Diverse Solutions Engineering to Bridge the Gap Between Cybersecurity and Safety for Oil, Gas and Petrochemical Organizations

    This partnership between Industrial Defender and Diverse Solutions Engineering incorporates OT cybersecurity into process hazard analyses to prevent cyberattacks.

    Industrial Defender Named Hot Company in OT Vulnerability Management by Cyber Defense Magazine in the Global InfoSec Awards

    Industrial Defender has received the “Hot Company in Operational Technology Vulnerability Management” award from Cyber Defense Magazine (CDM).

    Industrial Defender ASM for Splunk App Delivers Deeper Contextual Data for Faster Response to Security Events

    The Industrial Defender ASM for Splunk app increases the effectiveness of using Splunk in OT environments by providing detailed asset information to quickly identify and mitigate potential cybersecurity issues.

    Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond

    Join us as we discuss what ICS security trends to expect this year, including which preventative controls organizations should adopt, what legislation and frameworks we might see from the government and more.

    OT Security 101 Training: How to Get Started

    Join our webinar for helpful insights on how to apply foundational OT cybersecurity controls to protect the availability and safety of your ICS environment.

    Webinar – Why Hasn’t SOAR Taken Off in OT?

    Learn how to enable SOAR in your OT environment and gain access to contextual asset data in this webinar featuring Splunk.

    How to Navigate Operational Technology (OT) Cybersecurity in Port Environments

    Learn how to manage the complexities of connected OT systems and their cybersecurity needs in port and marine environments.

    Webinar – Breaking Down TSA’s Cybersecurity Requirements for Pipeline Operators: What to Do Now

    Learn what pipeline operators should do now to deal with this new Security Directive and satisfy TSA’s Pipeline Security Guidelines.

    Webinar – Squashing Spreadsheets: How to Orchestrate OEM Patch & Vulnerability Management

    Learn how to automate your OEM patch & vulnerability monitoring processes to make smarter patching decisions in this webinar featuring FoxGuard Solutions.