Support

We Protect Critical Infrastructure and Industrial Operations

Learn How
The #1 Name in OT Cybersecurity
Learn more

Risk Based Vulnerability Management for OT

Achieving NERC CIP Compliance Efficiently

Meeting Australia’s SOCI/CIRMP Deadlines

Who we are

Your Partner in OT Cyber Risk Management

Industrial Defender has pioneered OT cybersecurity innovations since 2006. In that time, we have become the cybersecurity partner of choice for critical industries around the world.

Headquartered outside of Boston, MA, we are a US-based company.

Learn More About Us
Who we protect

We secure the world’s critical industrial assets, including 8 of the 10 largest power companies in North America

Our stable, cutting-edge platform greatly reduces the risk of a successful cyberattack, something that is more important than ever in today’s world.

Read customer success stories
What our clients say

"Since 2012, Industrial Defender has been instrumental in bolstering Xcel Energy's cybersecurity efforts, managing OT assets, and ensuring compliance with NERC CIP, TSA Directive, and internal policies, thereby supporting our delivery of reliable electric and natural gas services to millions of customers."

What customers say

99% of our customers stay with us

Because Industrial Defender is more than just a point solution, customers continue to renew and expand our stable, scalable platform.

"Other vendors claim they do OT asset management, but Industrial Defender actually IS an asset management platform."

– Director of Security at Fortune 500 Oil & Gas Company

"Industrial Defender’s built-in asset discovery and configuration baselining for OT/ICS products, well-organized OT asset database and ability to extract audit evidence in a timely manner provides significant value to our team."

– Director of OT, New England Utility

“Industrial Defender’s support team is excellent to work with. Not only do they provide great support for their product, but they are willing to go the extra mile to innovate new custom features.”

– CEO at US Energy Company

“Industrial Defender provided very useful information about our cyber risk posture that we were able to use to harden our environment further and feel reassured that we are protected against future threats.”

– Director of IT at Rand McNally

“Industrial Defender worked as part of our plant commissioning team and significantly reduced manual data collection processes for our low-level endpoints.”

– Plant Manager at Fortune 500 Utility
Partners & support

Setting you up for cybersecurity success

Continuously innovating for our customers
An impressive technology and channel partner ecosystem
Cybersecurity experts to help maintain your defenses over time
Let's meet

Schedule a demo

Get a personalized demonstration of what our solution can do for your team.

Schedule a Demo
Let’s take a deeper dive

Watch a demo video

View videos of our solution based on your unique challenges.

Keep Learning

What’s happening at Industrial Defender

Tracking Volt Typhoon, State-Sponsored Threat Activity Against Critical Infrastructure
Read More
Overwhelmed by Vulnerabilities? Contextualizing OT Threats with Risk Based Vulnerability Management
Read More
What’s Old Is New Again: Protecting Critical Infrastructure in 2024
Read More
The PrOtect OT Cybersecurity Podcast: 2023 Wrapped
Read More
Podcast: Episode #44 - Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community
Read More
Podcast: Episode #43 - Don C. Weber: The Gray Area Between OT and IT
Read More
Podcast: Episode #42 - Ron Brash: Understanding the Small Details to Define Risk
Read More
Podcast: Episode #41 - Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership
Read More
Podcast: Episode #40- Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
Read More
CMMC for OT: Working with the DoD as an Industrial Organization
Read More
Podcast: Episode #37 - Nick Tsamis: Leveraging MITRE’s Adversary Emulation Platform in OT
Read More
Podcast: Episode #38 - Eric Smith: The Importance of Physical Security in Protecting Infrastructure
Read More
Podcast: Episode #39 - John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk
Read More
The Highs and the Lows: Protecting Critical Infrastructure Across High, Medium, and Low-Impact
Read More
Qatar Calls for ISA 62443 Compliance in Electric & Water Utilities
Read More
Does it Take a Pair of SOCs to Manage Both IT and OT Security?
Read More
Podcast: Episode #36- Chris Bihary: Tapping Into Packet Level Data in OT
Read More
Podcast: Episode #35 - Raphael Arakelian: Beyond the Tools - Maturing Implementation to Reduce Risk
Read More
Podcast: Episode #34 - Jonathan Tubb: Unlocking Business Value at the Intersection of IT, OT, Operations, and Cybersecurity
Read More
Podcast: Episode #33 - Josh Varghese: Holistic, Scalable OT Network Design
Read More
Podcast: Episode #32 - Fred Gordy: Protecting the Safety and Resilience of the Buildings We Live and Work In
Read More
Podcast: Episode #31 - Matthew Scott: Protecting Legacy OT in Mass Transit
Read More
Podcast: Episode #30 - Clint Bodungen: Cybersecurity Simulation As A Video Game, With AI Adversaries
Read More
Podcast: Episode #29 - Ian Frist: Beyond Buzzwords, Building Effective Programs in OT Security
Read More
Podcast: Episode #28 - Michael Weigand - From Planes to Power Plants, Protecting The Intersection of Physical and Digital
Read More
Podcast: Episode #27 - Daniel Bardenstein:  Transparency and Trust With SBOM
Read More
The Latest with Australia’s Security of Critical Infrastructure Act (SOCI Act) and Critical Infrastructure Risk Management (CIRMP)
Read More
Getting Active The Right Way (In OT Security): Going Beyond the Passive Approach
Read More
Podcast: Episode #26 - Terence Gill & Roger Simmons: Bringing Texas Utilities Together to Strengthen The Grid Through Collaboration
Read More
The Philosophy and History Behind Compliance, And Its Necessity for Protecting Critical Infrastructure
Read More
Podcast: Episode #24 - Pete Mauro: Designing System Security Before ‘Cyber’ Became Part of Everyday Vocabulary.
Read More
Podcast: Episode #23 - Danielle Jablanski: Navigating the Multitude of OT Technologies Considering Interoperability, Reliability, and Centralization
Read More
Podcast: Episode #25 - Mollie Breen: Accelerating OT Security, Reliability and Efficiency
Read More
Podcast: Episode #21 - Michael Welch: Tying Resilience, Availability, Compliance and Cybersecurity Together Into a GRC Program
Read More
Taking the Tedious out of Compliance & Governance with Automated, Centralized OT Asset Data
Read More
The Distinction Between Asset Management and Asset Inventory in Operational Technology and Their Roles in Cybersecurity
Read More
Podcast: Episode #22 - Joy Ditto: The Evolution of Utility Cybersecurity with NERC CIP
Read More
Podcast: Episode #19 - Eric Olden: Navigating Identity Management, Security, and Resilience in Multi-Cloud Ecosystems
Read More
Podcast: Episode #17 - Roya Gordon: OT/IoT Security Research Evangelist
Read More
Podcast: Episode #18 - Phoenix: OT Security for Smaller Plants and Factories
Read More
Podcast: Episode #20 - Matt Wyckhouse: Behind the Cyber Shield: OT Security and the Importance of SBOM
Read More
Podcast: Episode #16 - Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
Read More
Podcast: Episode #15 - Bryson Bort: Contextualizing Cyber Risks To Prioritize Security Efforts
Read More
Podcast: Episode #14 - Emilio Salabarria: Building Organizational Resilience through Cyber Assessments
Read More
Podcast: Episode #13 - Dan Gunter - How our Growing Ability to Process Data Affects Cybersecurity
Read More
Podcast: Episode #12 - Slade Griffin: Securing the Industrial World
Read More
Podcast: Episode #11 - Kurt Sanger
Read More
Podcast: Episode #10 - Tony Sager: Practicality Over Perfection and Simplifying Security Standards
Read More
Podcast: Episode #9 - Keeping People Safe is the Heart of Cybersecurity – A Conversation with Vice Admiral TJ White
Read More
Podcast: Episode #8 - Debbie Gordon: Practicing Cyber Safety Through Simulated Environments
Read More
Podcast: Episode #7 - Patrick Miller: Discussing the New INSM Requirements for NERC-CIP
Read More
Podcast: Episode #6 - Sean Plankey: Protecting Critical Systems Within the IT/OT Convergence
Read More
Podcast: Episode #5 - Lucian Niemeyer: Making Cyber Safety A Part Of Culture
Read More
Emerging NERC CIP Requirements for Internal Network Security Monitoring (INSM)
Read More
Podcast: Episode #4 - A Roundtable Discussion with Industrial Defender Leaders
Read More
Podcast: Episode #3 – Greg Valentine: You’re Compliant. Now Prove it.
Read More
Podcast: Episode #2 - Dennis Murphy: The Challenges With IT and OT Convergence
Read More
Podcast: Episode #1 - Welcome to PrOTect OT Cybersecurity Podcast
Read More
$858 Billion Defense Bill: The Critical Infrastructure & Industrial Cybersecurity Considerations
Read More
Hacked for the Holidays: Securing OT Infrastructure Against a Season of Increased Risk
Read More
Solving Cybersecurity Challenges in the Oil and Gas Industry
Read More
SIEM and Data Lakes in OT: New Challenges Bring New Choices
Read More
Modernizing Maritime OT Cybersecurity: Unique Obstacles and Opportunities
Read More
Don’t Give Compliance a Bad Name
Read More
A Guide to Configuration and Change Management in OT
Read More
A Breakdown of TSA’s Security Directive 1580-21-01A to Enhance Railroad Cybersecurity
Read More
One Destination, Multiple Paths: The 4 Data Collection Methods Needed for True OT Asset Management
Read More
What Is Shadow OT and Why Is It Important?
Read More
OT Asset Management Means Going Beyond OT Asset Visibility
Read More
3 Key Takeaways from Our 2022 State of OT Cybersecurity Research
Read More
TSA Issues Revised Security Directive Requirements for US Pipelines
Read More
China Is Targeting America’s Critical Infrastructure. Here’s What You Can Do About It.
Read More
How Quality Data Builds the Foundation for Machine Learning in Cybersecurity
Read More
How to Overcome Vulnerability & Patch Management Challenges in Your OT Environment
Read More
FBI’s Internet Crime Report Discloses 3,700+ Ransomware Attacks in 2021
Read More
Massive DDoS Attack Hits Israel
Read More
Cyber Incident Reporting for Critical Infrastructure Act Signed Into Law
Read More
Biden Administration Announces Plan for Electric System Cybersecurity
Read More
NIST Releases Draft of Cybersecurity Framework Profile for Ransomware Risk Management
Read More
An Overview of the Proposed Revisions to NERC CIP-004 and CIP-011
Read More
Meat Packing Giant JBS Hit with Cyberattack
Read More
DHS Issues Pipeline Cybersecurity Directive
Read More
An Overview of CISA’s ICSA-21-056-03 Advisory for Rockwell Automation Logix Controllers
Read More
Biden Extends Huawei Ban and Issues New Guidance on Improving Cybersecurity
Read More
Florida Water Treatment Plant Hit With Cyber Attack
Read More
How to Create an EDR/MDR Alternative for OT Systems
Read More
Managing Cybersecurity for Renewable Energy Resources
Read More
Summary of NERC CIP Requirements
Read More
Using the NIST CSF Security Controls to Prevent and Recover from Ransomware
Read More
What Is NERC CIP: The Ultimate Guide
Read More
7 Questions to Ask When Choosing an OT Cybersecurity Solution
Read More
OT Cybersecurity: The Ultimate Guide
Read More
Satellite Cybersecurity Act of 2022 Highlights Growing Importance of Satellite Networks in Critical Infrastructure
Read More
How to Centralize OT Security Data in a SIEM
Read More
What Impact Will the Proposed SEC Cybersecurity Rules Have on Public Companies?
Read More
OT Vulnerability Management: A Deep Dive
Read More
Asset Visibility vs. Asset Management
Read More
Understanding the Importance of Operational Technology Security in the Maritime Industry
Read More
NERC CIP Checklist for Identification and Categorization of BES Cyber Assets
Read More
Defending the Industrial Internet of Things
Read More
S4 2024
Event Details
GISEC Global 2024
Event Details
Industrial Defender Announces Strategic Technology Partnership with Dragos to Secure Critical Operations
Industrial Defender Appoints OT Cybersecurity Veteran Patrick Miller as Strategic Technical Advisor
Industrial Defender Joins the E-ISAC Vendor Affiliate Program, Strengthening Collaboration and Cybersecurity in the Electricity Sector
Introducing Industrial Defender Risk Signal, an Intelligent Risk-Based Vulnerability Management Solution for OT Security
Industrial Defender Appoints Power Industry Luminary Joy Ditto as Strategic Advisor
The Future of Asset Management in Operational Technology
Industrial Defender Launches Phoenix: A Quick-Start OT Visibility & Security Solution for Small to Medium Sized Operations
Industrial Defender Launches 7.5 Platform: A Unified Source for Operational Asset Data
Industrial Defender Partners with Nozomi Networks to Extend Endpoint Security Capabilities in Industrial Environments
Industrial Defender Appoints Gabe Authier as Chief Product Officer
Industrial Defender Appoints Aaron Crow as Chief Technology Officer
Industrial Defender Releases Inaugural State of OT Cybersecurity Research Survey Report
Industrial Defender Appoints Jay Williams as Chief Executive Officer
Rising threats spark US scramble for cyber workers
Forbes Expert Panel - 13 Tech Areas, Functions And Laws Facing New Or Potential Government Oversight
Colonial Pipeline was cyber wake-up call; Ukraine war is escalator
Industrial Defender Unveils New OT Vulnerability Management Solution, Immunity by ID™
Industrial Defender and GrayMatter Team Up to Equip Energy and Water Companies with Holistic Cybersecurity Defenses
Oil and gas industry scrutinized for weak cyber defenses
Need for critical infrastructure sector to shore up cyber defenses, amid geopolitical tensions
Industrial Defender Opens European Office in the Netherlands to Meet Increasing Global Demand for OT Cybersecurity
4 Tips to Secure the OT Cybersecurity Budget You Require
Why Cyber Due Diligence Is Essential to the M&A Process
Security leaders on how to cope with stress of Log4j
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2022 Cybersecurity Excellence Awards
Industrial Defender 7.4 Centralizes Data Collection, Offers Customized Risk Calculations to Secure OT Environments
Watch: Industrial Defender Featured in Congressional Transportation Committee Hearing
Industrial Defender and BridgeWare Partner to Bring Operational Technology Cybersecurity to Korea
Video: Digital Anarchist Interviews CEO Jim Crowley On National Security Directive
Podcast: CS2AI Becoming an Effective Leader in Technology Control Systems
Industrial Defender Delivers Industry-First OT Machine Learning Engine Using Both Network and Endpoint Data
Industrial Defender and Fetch Automation Partner to Deliver Operational Technology Cybersecurity and Compliance Solutions for Australia
Executive Q&A: Cyberattack Warnings and Trends
The Need to Protect Digital Infrastructure Highlights This ETF
Don't Let Cybercriminals Ruin your Merger or Acquisition–Follow This Expert's Advice
Russia, China, Cyber War, and Letters of Marque and Reprisal
Industrial Defender Partners with Diverse Solutions Engineering to Bridge the Gap Between Cybersecurity and Safety for Oil, Gas and Petrochemical Organizations
Industrial Defender CEO Jim Crowley Quoted on ToolboxTech.com
Industrial Defender Named Hot Company in OT Vulnerability Management by Cyber Defense Magazine in the Global InfoSec Awards
Industrial Defender ASM for Splunk App Delivers Deeper Contextual Data for Faster Response to Security Events
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2021 Cybersecurity Excellence Awards
Industrial Defender and aeCyberSolutions Join Forces to Elevate OT Cybersecurity Assessments for Energy and Maritime Companies
Rand McNally Selects Industrial Defender to Secure Its Industrial Internet of Things
Industrial Defender and Technomak Partner to Secure Critical Infrastructure in the Middle East
Industrial Defender Launches CopilOT Service™ to Address Cybersecurity Talent Shortage for Critical Infrastructure Companies
Industrial Defender Establishes IT-OT Integration Lab to Virtually Research, Develop and Evaluate ICS Cybersecurity Technologies
Industrial Defender and aDolus Partner to Secure ICS Supply Chain with Independent File Validation
Industrial Defender and FoxGuard Solutions Team Up to Transform Patch and Vulnerability Management for OT Security Teams
Industrial Defender and Waterfall Security Solutions Partner to Safely Transmit Cybersecurity Data in Operational Technology Environments
Industrial Defender Strengthens OT Asset Anomaly Detection Platform and Assisted Passive Network Monitoring Engine to Automate Risk Quantification and Reporting
Teleo Capital Completes Acquisition of Industrial Defender from CapGemini America
Webinar: Defending Against Attackers who use AI as a Weapon
Watch Webinar
Webinar: Surviving the Wave of Cyber Threats and Regulations: The Information Industrial Operators Need
Watch Webinar
Webinar: Revisiting the Fundamental Mission of NERC-CIP: Improving Reliability & Security - with Special Guest Speaker: Joy Ditto
Watch Webinar
Webinar: Practical Strategies for Remote Access Security in Bulk Electric Systems: Tackling New NERC CIP-003-9 Requirements
Watch Webinar
Webinar: NIS2 Compliance for OT Operators - What You Should Be Doing Today
Watch Webinar
Webinar: Preparing for NERC-CIP's INSM Requirements
Watch Webinar
Breaking Down TSA’s Revised Security Directive: What Pipeline Operators Need to Know
Watch Webinar
Webinar: Shadow OT — Keeping the World’s Lights on With the OT Security Add-on for Splunk
Watch Webinar
Webinar: Managing OT Data
Watch Webinar
Webinar: Prepare and Prevent: Using the AESCSF to Prepare for the SLACIP Bill 2022
Watch Webinar
Webinar: Why Do Ransomware Gangs Target Private Equity Portfolio Companies?
Watch Webinar
Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond
Watch Webinar
OT Security 101 Training: How to Get Started
Watch Webinar
Webinar: Why Hasn't SOAR Taken Off in OT?
Watch Webinar
Webinar: How to Navigate Operational Technology (OT) Cybersecurity in Port Environments
Watch Webinar
Webinar - Breaking Down TSA’s Cybersecurity Requirements for Pipeline Operators: What to Do Now
Watch Webinar
Webinar - Squashing Spreadsheets: How to Orchestrate OEM Patch & Vulnerability Management
Watch Webinar
Webinar: What’s Hiding in Your Software? How SBOMs Reduce Supply Chain Risk
Watch Webinar
Webinar: Are You Using MITRE ATT&CK for ICS Correctly?
Watch Webinar
Webinar: How to Build a Cybersecurity Strategy for Your Building Management System
Watch Webinar