About this Glossary
This glossary defines key terms used in operational technology (OT) cybersecurity, including how Industrial Defender approaches and applies these concepts. Terms are grouped by theme to make it easier to understand how similar ideas relate to each other, especially where definitions often overlap in industry conversations.
Industrial Defender builds in a wide variety of hardware, firmware and software data collection methods, including active, agentless and passive options, into one sensor. Our solution provides features that a passive solution can’t, including:
We can also ingest data from your passive monitoring solution to give you more granular asset data and better SIEM integrations.
Our one-click compliance reporting for 50+ international standards and regulations gives you all the information you need to prove compliance with your standard. We help 8 of the top 10 utilities in the UnitedStates stay compliant with the most stringent standard in the world, NERC CIP.
SOC analysts love us! Our solution provides the contextual asset intelligence they need to act on threat intelligence and security alerts. If you are a Splunk user, check out our Splunk integration. It’s the best in the OT space:
https://www.industrialdefender.com/industrial-defender-splunk/
No, Industrial Defender is a comprehensive OT security platform offering asset visibility, asset management, vulnerability management, security monitoring and compliance reporting in one UI.
Yes, we have a comprehensive API that connects with almost anything you need it to! For more information on our data sharing capabilities, checkout our integrations data sheet: https://www.industrialdefender.com/integrations-data-sheet/
Yes, we have comprehensive integration options with ServiceNow, IBM, BMC and more.
OT environments are both unique and sensitive. Performing those types of scans in operational systems is both risky and incomplete. Our scanless, cloud-based offering, Immunity by ID, leverages machine learning and natural language processing to create a prioritized list of vulnerabilities using existing asset inventory information. Learn more about Immunity here: https://www.industrialdefender.com/immunity-by-industrial-defender/
Yes, our comprehensive APIs share any data our system collects with your SIEM of choice.
We recommend pitching OT cybersecurity investments in terms of risk reduction and TCO. Industrial Defender can help you consolidate multiple point solutions for visibility, security and compliance into one tool.Because of our turnkey deployments, scalable infrastructure and team of experts, we have the lowest TCO in the industry. If you need help quantifying risk, we’ve created this helpful risk calculator: https://www.industrialdefender.com/risk-calculator-request/
No, both Illuminate and Immunity can be purchased as standalone solutions. You can also individually license ID core components based on your needs.
Yes, you can run ID on virtual or physical machines or in the cloud. We also offer a hosted managed service, CopilOT, to help augment your security team.
Our solution is simple enough that you can manage it yourself. If you need help managing the tool, we also offer a wide range of Professional Services to help. https://www.industrialdefender.com/professional-services/
The practice of protecting operational technology systems that control physical processes across critical infrastructure sectors.
At Industrial Defender, we use “OT security” as a broad, inclusive term that encompasses traditional control systems, IIoT technologies, and facility-level systems like building management platforms.
A subset of OT security focused on securing systems such as PLCs (Programmable Logic Controllers), RTUs (Remote Terminal Units), and DCS (Distributed Control Systems) used in industrial automation.
At Industrial Defender, ICS security is central to our work in environments like utilities, oil & gas, and manufacturing.
A specialization within ICS security focused specifically on protecting SCADA systems, which provide centralized monitoring and control over distributed assets.
SCADA systems are commonly found in sectors like power transmission, water treatment, and pipeline operations.
At Industrial Defender, securing SCADA environments is an integral part of our OT security services.
The process of identifying, collecting, and maintaining comprehensive, accurate information about OT assets.
At Industrial Defender, this means more than an inventory—it includes rich metadata like configuration states, firmware versions, user accounts, and running services, making the data actionable for security and compliance teams.
The ability to observe and understand what assets and behaviors exist within an OT environment.While the term often refers to passive network monitoring, Industrial Defender combines passive and safe active methods to deliver confirmed, in-depth visibility into asset configurations and system activity.
Cyber-physical security protects systems where digital infrastructure directly impacts physical operations, such as power grids, industrial machinery, and safety systems.
This concept has emerged as cyberattacks increasingly pose real-world risks—highlighting the need to secure both digital systems and the physical processes they control.
At Industrial Defender, protecting cyber-physical systems is at the core of our mission, safeguarding the convergence of digital and physical environments against evolving cyber threats.
The protection of automated building systems that control HVAC, lighting, access control, energy usage, and more.
At Industrial Defender, we see BMS security as part of the broader OT security landscape. These systems may not be industrial, but they are operational—and essential for facilities like hospitals, data centers, and airports.
Refers to general-purpose connected devices used in homes, offices, and commercial settings—like smart thermostats, fitness trackers, or building sensors.
While IoT can include healthcare devices (sometimes referred to as IoMT – Internet of Medical Things), Industrial Defender’s focus remains on securing industrial environments.
Describes connected devices used in industrial environments to support automation, monitoring, and optimization of operations—such as smart sensors, remote diagnostics, and predictive maintenance tools.
At Industrial Defender, we specialize in securing IIoT devices that operate within regulated and safety-critical environments.
A subset of IoT that includes connected medical devices used in healthcare settings—such as infusion pumps, wearable monitors, and diagnostic tools.
While not our primary focus, this category is useful to understand when comparing how different industries categorize cyber-physical devices.
Defined as sectors and systems essential to public safety, national security, and economic stability.
In the U.S., this includes 16 sectors identified by CISA, such as Energy, Water, Transportation, and Communications.
In the EU, the NIS2 directive expands on these categories, requiring enhanced cybersecurity measures from both essential and important entities.
At Industrial Defender, we serve organizations across these critical sectors—helping them meet strict regulatory requirements while strengthening operational resilience.