We Invented OT Security

Founded in 2006, Industrial Defender was the first OT cybersecurity provider in the market. The Industrial Defender application has been widely adopted by some of the largest critical infrastructure companies in the world to provide asset management and cybersecurity monitoring for their OT environments. Industrial Defender is a specialized solution that navigates the complexities and risks of interacting with real-time control systems, and our engineering experts continuously innovate to meet new security challenges in industrial control systems (ICS).

With installations in North America, the Middle East, Europe, and Australia, Industrial Defender works with some of the largest utility and energy companies in the world, as well as manufacturing, transportation and higher education companies. All of our engineering is based in North America, and our development team is held to stringent cybersecurity standards.

View Executive Brief

We were the first OT cybersecurity provider in the market.
Our customers include some of the largest energy companies in the world.
Our product development is 100% North America-based.

Company Timeline

A Long History of Innovation


Industrial Control Systems Cybersecurity Blog and News

NERC CIP-007 R2: Why Is Patch Management So Hard & What Can We Do About It

An illustration of why it’s so difficult to comply with the patch management requirements in NERC CIP-007 R2 and what you can do to make it easier.

NIST Releases Draft of Cybersecurity Framework Profile for Ransomware Risk Management

NIST has released a new draft of the NISTIR 8374 Cybersecurity Framework Profile for Ransomware Risk Management which provides updated guidance for preventing and recovering from ransomware.

Cyber Incident Reporting for Critical Infrastructure Act of 2021 Introduced by US House of Representatives

The U.S. House Homeland Security Committee has introduced the Cyber Incident Reporting for Critical Infrastructure Act of 2021, which would require critical infrastructure firms to disclose cybersecurity incidents to CISA within 72 hours of discovery.

An Overview of the Proposed Revisions to NERC CIP-004 and CIP-011

Proposed revisions to two NERC CIP standards have been submitted to the Federal Energy Regulatory Commission (FERC) for consideration. The two affected standards are CIP-004 and CIP-011.

A Guide to NIS Directive Compliance

Learn what the NIS Directive is, who it applies to, potential penalties for non-compliance and best practices for complying with the Directive.

NERC CIP Checklist for Identification and Categorization of BES Cyber Assets

NERC CIP 002-5.1a can be divided into three steps: identify systems, inventory assets, categorize risk. This can serve as a helpful model for approaching and maintaining compliance.


Webinar – Why Hasn’t SOAR Taken Off in OT?

Learn how to enable SOAR in your OT environment and gain access to contextual asset data in this webinar featuring Splunk.

Asset Visibility vs. Asset Management

Combining asset visibility and asset management results in robust asset awareness. Each is a distinct concept but relies upon the other to be effective.

How Contextual Asset Data Makes SOAR Possible in OT Environments

SOAR technologies are used to automate parts of the security investigation process, and access to the right contextual data is vital when using these tools in operational technology (OT) environments.