We Invented OT Security

Founded in 2006, Industrial Defender was the first OT cybersecurity provider in the market. The Industrial Defender application has been widely adopted by some of the largest critical infrastructure companies in the world to provide asset management and cybersecurity monitoring for their OT environments. Industrial Defender is a specialized solution that navigates the complexities and risks of interacting with real-time control systems, and our engineering experts continuously innovate to meet new security challenges in industrial control systems (ICS).

With installations in North America, the Middle East, Europe, and Australia, Industrial Defender works with some of the largest utility and energy companies in the world, as well as manufacturing, transportation and higher education companies. All of our engineering is based in North America, and our development team is held to stringent cybersecurity standards.

View Executive Brief

We were the first OT cybersecurity provider in the market.
Our customers include some of the largest energy companies in the world.
Our product development is 100% North America-based.

Company Timeline

A Long History of Innovation


Industrial Control Systems Cybersecurity Blog and News

CVE-2021-44228 – Industrial Defender update on log4j

Learn about the log4j vulnerability from Industrial Defender’s security and R&D teams, including how to detect it in your own OT environment.

3 Tips for Rail Operators to Get Started with ICS Cybersecurity

To keep passengers and crew safe, transportation organizations must implement preventative cybersecurity measures to avoid cyberattacks. Here are 3 tips to get rail operators started with ICS security.


How to Create an EDR/MDR Alternative for OT Systems

To combat threats like ransomware, organizations must centralize detection and response efforts, but EDR/MDR solutions are not a good fit for operational technology. Learn about an EDR/MDR alternative for OT systems.

NERC CIP-007 R2: Why Is Patch Management So Hard & What Can We Do About It

An illustration of why it’s so difficult to comply with the patch management requirements in NERC CIP-007 R2 and what you can do to make it easier.

NIST Releases Draft of Cybersecurity Framework Profile for Ransomware Risk Management

NIST has released a new draft of the NISTIR 8374 Cybersecurity Framework Profile for Ransomware Risk Management which provides updated guidance for preventing and recovering from ransomware.

Cyber Incident Reporting for Critical Infrastructure Act of 2021 Introduced by US House of Representatives

The U.S. House Homeland Security Committee has introduced the Cyber Incident Reporting for Critical Infrastructure Act of 2021, which would require critical infrastructure firms to disclose cybersecurity incidents to CISA within 72 hours of discovery.

An Overview of the Proposed Revisions to NERC CIP-004 and CIP-011

Proposed revisions to two NERC CIP standards have been submitted to the Federal Energy Regulatory Commission (FERC) for consideration. The two affected standards are CIP-004 and CIP-011.

A Guide to NIS Directive Compliance

Learn what the NIS Directive is, who it applies to, potential penalties for non-compliance and best practices for complying with the Directive.

NERC CIP Checklist for Identification and Categorization of BES Cyber Assets

NERC CIP 002-5.1a can be divided into three steps: identify systems, inventory assets, categorize risk. This can serve as a helpful model for approaching and maintaining compliance.