Homepage

The Leader in OT Cyber Asset Management

Industrial Defender brings you beyond asset visibility

LEARN MORE

Deep Inventory of Hardware Assets

Full coverage of all devices in your OT environment not just the ones communicating on the network.

Deep Inventory of Software Assets

Full coverage of all software and firmware including 3rd party software, executables, drivers and project files.

Configuration Change Management

Know exactly what changed and when. Correlate changes with security events, vulnerabilities and patches. Baseline changes for compliance.

Vulnerability Monitoring + OEM Patches

Combine deep inventory with vulnerability monitoring and OEM patches to see beyond the noise of network based threats.

Network and Endpoint Events

Aggregate and correlate events from any OT data source with workflows for reviewing and sharing with your SOC.

Policy and Risk Management For Security Standards

The most comprehensive reporting platform for OT security standards and risk governance.

Partner with Industrial Defender to understand your OT security posture safely and completely.

  • L0: Equipment
  • L2/3: Control Room Building
  • L1: Controllers and I/Os
  • L2/3: Relay Switch Room
  • L4: Administrative Building
  • Third Party Vendor Access
  • Warehouse & Distribution Facilities
  • RTG Cranes
  • Ship to Shore Gantry Cranes
  • Ship Onboard Systems
  • L1/2: Controllers and I/O Room
  • L3.5: Plant administration
  • L0: Equipment
  • L3: Control Room
  • L4: Corporate HQ
  • Lighting System
  • Process Equipment
  • HVAC System
  • Distributed Control System
  • Energy System
  • Elevator Control Room
  • HVAC System
  • Corporate Network
  • VIDEO

    What Does Industrial Defender Do?

    FEATURES

    Manage all of your OT security tasks from one place.

    View Solution Brief
    View Solution Brief
    View Solution Brief
    View Solution Brief
    View Solution Brief
    View Solution Brief

    Our Partners

    Get Started with Your OT Security Project

    Take a guided tour of the product with one of our knowledgeable staff members.

    Asset
    Visibility & Management
    Vulnerability Management
    IT/OT Collaboration
    Compliance Reporting

    OT Cybersecurity Blog, News, and Events

    Industrial Defender 7.4 Centralizes Data Collection, Offers Customized Risk Calculations to Secure OT Environments

    Introduces Industrial Defender Central Manager (IDCM) and the Industrial Defender Collector (IDC) for centralized OT endpoint and network data collection and management

    CVE-2021-44228 – Industrial Defender update on log4j

    Learn about the log4j vulnerability from Industrial Defender’s security and R&D teams, including how to detect it in your own OT environment.

    Watch: Industrial Defender Featured in Congressional Transportation Committee Hearing

    Industrial Defender was mentioned during a recent Congressional House Committee on Transportation & Infrastructure Committee, where congressman Jake Auchincloss discusses cybersecurity in the transportation sector.

    Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond

    Watch this webinar to learn what ICS security trends to expect in 2022. Hear from Jim Crowley, Industrial Defender CEO, and Peter Lund, VP Product Management, as they discuss predictions and trends for the 2022 OT cybersecurity landscape.

    3 Tips for Rail Operators to Get Started with ICS Cybersecurity

    To keep passengers and crew safe, transportation organizations must implement preventative cybersecurity measures to avoid cyberattacks. Here are 3 tips to get rail operators started with ICS security.

    EDR/MDR for OT

    How to Create an EDR/MDR Alternative for OT Systems

    To combat threats like ransomware, organizations must centralize detection and response efforts, but EDR/MDR solutions are not a good fit for operational technology. Learn about an EDR/MDR alternative for OT systems.

    Cyber Senate Control Systems Cybersecurity Europe Conference

    We’re thrilled to be sponsoring the Cyber Senate Europe conference! Learn more about our new OT Machine Learning (OTML) Engine, powered by Splunk, which maps contextual OT endpoint and network data from Industrial Defender to Splunk’s extensive Machine Learning Toolkit algorithms.

    API Cybersecurity Conference

    We’re thrilled to sponsor API Cybersecurity Conference!

    S4x22

    We’re excited to be back at S4! Stay tuned for more details around Industrial Defender’s participation in speaking sessions and thought leadership.

    Watch: Industrial Defender Featured in Congressional Transportation Committee Hearing

    Industrial Defender was mentioned during a recent Congressional House Committee on Transportation & Infrastructure Committee, where congressman Jake Auchincloss discusses cybersecurity in the transportation sector.

    Podcast: CS2AI Becoming an Effective Leader in Technology Control Systems

    In this episode of the (CS)²AI Podcast, Industrial Defender CEO Jim Crowley shares his fascinating journey into the world of cyber security. He explains the ingredients that contributed to Industrial Defender becoming a leader in the cybersecurity space.

    Video: Digital Anarchist Interviews CEO Jim Crowley On National Security Directive

    President Biden’s new national security directive aims to boost defenses against ransomware attacks and the hacking of critical infrastructure. In this video, Jim Crowley of Industrial Defender discusses what Biden’s new infrastructure and cybersecurity bill means for the industry.

    Executive Q&A: Cyberattack Warnings and Trends

    Are cyberattacks more common over holiday weekends? What do you need to know about cybersecurity trends? Industrial Defender CEO Jim Crowley shared his insight with us.

    The Need to Protect Digital Infrastructure Highlights This ETF

    Building out digital infrastructure is one of the agendas in the trillion-dollar infrastructure plan that’s up for debate in the House of Representatives, but said infrastructure also needs to be protected.

    Don’t Let Cybercriminals Ruin your Merger or Acquisition–Follow This Expert’s Advice

    Companies are vulnerable to potential cyberthreats during mergers and acquisitions; learn from an expert why and how to reduce security risks during the transition.

    Industrial Defender 7.4 Centralizes Data Collection, Offers Customized Risk Calculations to Secure OT Environments

    Introduces Industrial Defender Central Manager (IDCM) and the Industrial Defender Collector (IDC) for centralized OT endpoint and network data collection and management

    Industrial Defender and BridgeWare Partner to Bring Operational Technology Cybersecurity to Korea

    Korean critical infrastructure companies will benefit from Industrial Defender’s comprehensive OT security and compliance platform as part of BridgeWare’s software offerings.

    Industrial Defender Delivers Industry-First OT Machine Learning Engine Using Both Network and Endpoint Data

    Industrial Defender’s OTML supports machine learning at scale to mitigate cyber risks, including ransomware, for OT environments across the enterprise using Splunk’s Machine Learning Toolkit

    Industrial Defender and Fetch Automation Partner to Deliver Operational Technology Cybersecurity and Compliance Solutions for Australia

    Australian critical infrastructure companies will benefit from Industrial Defender’s comprehensive OT security and compliance platform as part of Fetch Automation’s software offerings.

    Industrial Defender Partners with Diverse Solutions Engineering to Bridge the Gap Between Cybersecurity and Safety for Oil, Gas and Petrochemical Organizations

    This partnership between Industrial Defender and Diverse Solutions Engineering incorporates OT cybersecurity into process hazard analyses to prevent cyberattacks.

    Industrial Defender Named Hot Company in OT Vulnerability Management by Cyber Defense Magazine in the Global InfoSec Awards

    Industrial Defender has received the “Hot Company in Operational Technology Vulnerability Management” award from Cyber Defense Magazine (CDM).

    Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond

    Watch this webinar to learn what ICS security trends to expect in 2022. Hear from Jim Crowley, Industrial Defender CEO, and Peter Lund, VP Product Management, as they discuss predictions and trends for the 2022 OT cybersecurity landscape.

    OT Security 101 Training: How to Get Started

    Join our webinar for helpful insights on how to apply foundational OT cybersecurity controls to protect the availability and safety of your ICS environment.

    Webinar – Why Hasn’t SOAR Taken Off in OT?

    Learn how to enable SOAR in your OT environment and gain access to contextual asset data in this webinar featuring Splunk.

    How to Navigate Operational Technology (OT) Cybersecurity in Port Environments

    Learn how to manage the complexities of connected OT systems and their cybersecurity needs in port and marine environments.

    Webinar – Breaking Down TSA’s Cybersecurity Requirements for Pipeline Operators: What to Do Now

    Learn what pipeline operators should do now to deal with this new Security Directive and satisfy TSA’s Pipeline Security Guidelines.

    Webinar – Squashing Spreadsheets: How to Orchestrate OEM Patch & Vulnerability Management

    Learn how to automate your OEM patch & vulnerability monitoring processes to make smarter patching decisions in this webinar featuring FoxGuard Solutions.