Learn how Industrial Defender ASM® protects against ICS vulnerabilities in a new way in this 5-minute demonstration by Peter Lund, Director of Product Management at Industrial Defender.
Questions Answered in this Video
Existing ICS monitoring solutions aren't always a good fit for finding and monitoring known vulnerabilities. Much of the industrial control hardware deployed today wasn't meant to be scanned on a network or host level. It can be difficult to install agents on devices with non-existing or closed-off operating systems, and by opening the device up to a remote scan, you offer a new way for attackers to get in.
Industrial Defender ASM® takes information from the asset inventory standpoint, compiling a list of all of the devices in your environment and then running the software inventory, patches, ports and service information through a customized vulnerability monitoring service hosted right here in Foxboro, MA. We run this information through databases like the National Vulnerability Database, ICS-CERT feed, Microsoft patch feed and Red Hat patch feed. All of the data is then available in an easy to manage module within ASM.
ASM provides 4 different ways to filter your vulnerabilities:
By giving the user an option to filter vulnerabilities a few different ways, and providing augmented information about each vulnerability within the application, we make it easy to stay on top of the weak spots in your ICS environment.