Support
How we compare

See why customers choose our platform for their OT cybersecurity transformation.

As a single platform for OT cyber risk management, we take you beyond visibility to help you manage your asset and security data.

Device Configuration Data

Installed firmware and software inventory, including versions
OS, including version and patches installed
Open ports and services
Removable media installed
Malicious code detected/AV
Failure of event logging
Serial number
Policies modified
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

System Access & Authentication

Successful and failed login attempts
Generic and shared user accounts
Local and A/D accounts
Password parameters and age
User account locked
Policies modified
Privilege raised
Failure of event logging
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

Firewall Information & Events

Firewall rules, including change detection
Blocked execution (packet)
Blocked unauthorized file
Policies modified
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

Asset Resource Utilization & Status

CPU usage over time
RAM usage over time
Disk space
Swap space
Connectivity lost
Shutdown
Rebooted and boot checksum
Backup failure
*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

An OT Asset Management Solution for the Future

Security teams need an automated approach to identify, monitor and manage every asset and document appropriate changes. Industrial Defender provides a single source of truth for your asset base that includes configuration and change management and enables a centralized cybersecurity program that can include vulnerability and patch management, version control, security baselines, risk assessments, incident response and compliance reporting.

For effective OT asset management, teams need access to four sources of data: physical inspection information, passive monitoring methods, configuration analysis and active discovery techniques. Industrial Defender leverages all four of these methods in one UI.

What customers say

99% of our customers stay with us

Because Industrial Defender is more than just a point solution, customers continue to renew and expand our stable, scalable platform.

"Industrial Defender’s built-in asset discovery and configuration baselining for OT/ICS products, well-organized OT asset database and ability to extract audit evidence in a timely manner provides significant value to our team."

– Director of OT, New England Utility

“Industrial Defender’s support team is excellent to work with. Not only do they provide great support for their product, but they are willing to go the extra mile to innovate new custom features.”

– CEO at US Energy Company

“Industrial Defender provided very useful information about our cyber risk posture that we were able to use to harden our environment further and feel reassured that we are protected against future threats.”

– Director of IT at Rand McNally

“Industrial Defender worked as part of our plant commissioning team and significantly reduced manual data collection processes for our low-level endpoints.”

– Plant Manager at Fortune 500 Utility

Explore Solutions by Type

OT Asset Management

Safely collect, monitor and manage OT asset data at scale

Explore

Vulnerability Management

Combine accurate OT asset inventory data with the power of NIST’s vulnerability database and ICS-CERT alerts to execute a risk-based vulnerability management program

Explore

Security Event Monitoring

Comprehensive OT security monitoring for complex industrial environments

Explore

Compliance Reporting

Automate manual compliance tasks with a suite of built-in reporting and policy options for a variety of standards.

Explore

What’s happening at Industrial Defender

Keeping Your Systems Healthy: 6 Questions for Evaluating Your OT Environment
Read More
Finding Exegol:  Star Charts and OT Asset Inventories
Read More
Cyber Incident Reporting: CISA’s Proposal to Clarify Industry Obligations
Read More
Does NERC CIP Allow Use of The Cloud?
Read More
Easter Eggs Don’t Belong in Your OT Environment
Read More
Spring Forward in OT Security with Efficient Configuration & Change Management
Read More
Tracking Volt Typhoon, State-Sponsored Threat Activity Against Critical Infrastructure
Read More
Overwhelmed by Vulnerabilities? Contextualizing OT Threats with Risk Based Vulnerability Management
Read More
What’s Old Is New Again: Protecting Critical Infrastructure in 2024
Read More
The PrOtect OT Cybersecurity Podcast: 2023 Wrapped
Read More
Podcast: Episode #44 - Thomas VanNorman: ICS Security Takes a Village - Building an OT Security Community
Read More
Podcast: Episode #43 - Don C. Weber: The Gray Area Between OT and IT
Read More
Podcast: Episode #42 - Ron Brash: Understanding the Small Details to Define Risk
Read More
Podcast: Episode #41 - Michael Holcomb: The Journey from IT to OT and Strengthening IT-OT Partnership
Read More
Podcast: Episode #40- Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
Read More
CMMC for OT: Working with the DoD as an Industrial Organization
Read More
Podcast: Episode #37 - Nick Tsamis: Leveraging MITRE’s Adversary Emulation Platform in OT
Read More
Podcast: Episode #38 - Eric Smith: The Importance of Physical Security in Protecting Infrastructure
Read More
Podcast: Episode #39 - John Cusimano: Leveraging ISA/IEC 62443 to Quantify OT Risk
Read More
The Highs and the Lows: Protecting Critical Infrastructure Across High, Medium, and Low-Impact
Read More
Qatar Calls for ISA 62443 Compliance in Electric & Water Utilities
Read More
Does it Take a Pair of SOCs to Manage Both IT and OT Security?
Read More
Podcast: Episode #36- Chris Bihary: Tapping Into Packet Level Data in OT
Read More
Podcast: Episode #35 - Raphael Arakelian: Beyond the Tools - Maturing Implementation to Reduce Risk
Read More
Podcast: Episode #34 - Jonathan Tubb: Unlocking Business Value at the Intersection of IT, OT, Operations, and Cybersecurity
Read More
Podcast: Episode #33 - Josh Varghese: Holistic, Scalable OT Network Design
Read More
Podcast: Episode #32 - Fred Gordy: Protecting the Safety and Resilience of the Buildings We Live and Work In
Read More
Podcast: Episode #31 - Matthew Scott: Protecting Legacy OT in Mass Transit
Read More
Podcast: Episode #30 - Clint Bodungen: Cybersecurity Simulation As A Video Game, With AI Adversaries
Read More
Podcast: Episode #29 - Ian Frist: Beyond Buzzwords, Building Effective Programs in OT Security
Read More
Podcast: Episode #28 - Michael Weigand - From Planes to Power Plants, Protecting The Intersection of Physical and Digital
Read More
Podcast: Episode #27 - Daniel Bardenstein:  Transparency and Trust With SBOM
Read More
The Latest with Australia’s Security of Critical Infrastructure Act (SOCI Act) and Critical Infrastructure Risk Management (CIRMP)
Read More
Getting Active The Right Way (In OT Security): Going Beyond the Passive Approach
Read More
Podcast: Episode #26 - Terence Gill & Roger Simmons: Bringing Texas Utilities Together to Strengthen The Grid Through Collaboration
Read More
The Philosophy and History Behind Compliance, And Its Necessity for Protecting Critical Infrastructure
Read More
Podcast: Episode #24 - Pete Mauro: Designing System Security Before ‘Cyber’ Became Part of Everyday Vocabulary.
Read More
Podcast: Episode #23 - Danielle Jablanski: Navigating the Multitude of OT Technologies Considering Interoperability, Reliability, and Centralization
Read More
Podcast: Episode #25 - Mollie Breen: Accelerating OT Security, Reliability and Efficiency
Read More
Podcast: Episode #21 - Michael Welch: Tying Resilience, Availability, Compliance and Cybersecurity Together Into a GRC Program
Read More
Taking the Tedious out of Compliance & Governance with Automated, Centralized OT Asset Data
Read More
The Distinction Between Asset Management and Asset Inventory in Operational Technology and Their Roles in Cybersecurity
Read More
Podcast: Episode #22 - Joy Ditto: The Evolution of Utility Cybersecurity with NERC CIP
Read More
Podcast: Episode #19 - Eric Olden: Navigating Identity Management, Security, and Resilience in Multi-Cloud Ecosystems
Read More
Podcast: Episode #17 - Roya Gordon: OT/IoT Security Research Evangelist
Read More
Podcast: Episode #18 - Phoenix: OT Security for Smaller Plants and Factories
Read More
Podcast: Episode #20 - Matt Wyckhouse: Behind the Cyber Shield: OT Security and the Importance of SBOM
Read More
Podcast: Episode #16 - Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
Read More
Podcast: Episode #15 - Bryson Bort: Contextualizing Cyber Risks To Prioritize Security Efforts
Read More
Podcast: Episode #14 - Emilio Salabarria: Building Organizational Resilience through Cyber Assessments
Read More
Podcast: Episode #13 - Dan Gunter - How our Growing Ability to Process Data Affects Cybersecurity
Read More
Podcast: Episode #12 - Slade Griffin: Securing the Industrial World
Read More
Podcast: Episode #11 - Kurt Sanger
Read More
Podcast: Episode #10 - Tony Sager: Practicality Over Perfection and Simplifying Security Standards
Read More
Podcast: Episode #9 - Keeping People Safe is the Heart of Cybersecurity – A Conversation with Vice Admiral TJ White
Read More
Podcast: Episode #8 - Debbie Gordon: Practicing Cyber Safety Through Simulated Environments
Read More
Podcast: Episode #7 - Patrick Miller: Discussing the New INSM Requirements for NERC-CIP
Read More
Podcast: Episode #6 - Sean Plankey: Protecting Critical Systems Within the IT/OT Convergence
Read More
Podcast: Episode #5 - Lucian Niemeyer: Making Cyber Safety A Part Of Culture
Read More
CIP-015-01: Emerging NERC CIP Requirements for Internal Network Security Monitoring (INSM)
Read More
Podcast: Episode #4 - A Roundtable Discussion with Industrial Defender Leaders
Read More
Podcast: Episode #3 – Greg Valentine: You’re Compliant. Now Prove it.
Read More
Podcast: Episode #2 - Dennis Murphy: The Challenges With IT and OT Convergence
Read More
Podcast: Episode #1 - Welcome to PrOTect OT Cybersecurity Podcast
Read More
$858 Billion Defense Bill: The Critical Infrastructure & Industrial Cybersecurity Considerations
Read More
Hacked for the Holidays: Securing OT Infrastructure Against a Season of Increased Risk
Read More
Solving Cybersecurity Challenges in the Oil and Gas Industry
Read More
SIEM and Data Lakes in OT: New Challenges Bring New Choices
Read More
Modernizing Maritime OT Cybersecurity: Unique Obstacles and Opportunities
Read More
Don’t Give Compliance a Bad Name
Read More
A Guide to Configuration and Change Management in OT
Read More
A Breakdown of TSA’s Security Directive 1580-21-01A to Enhance Railroad Cybersecurity
Read More
One Destination, Multiple Paths: The 4 Data Collection Methods Needed for True OT Asset Management
Read More
What is Shadow OT? How Does It Impact Your Security, Compliance, and Operations?
Read More
OT Asset Management Means Going Beyond OT Asset Visibility
Read More
3 Key Takeaways from Our 2022 State of OT Cybersecurity Research
Read More
TSA Issues Revised Security Directive Requirements for US Pipelines
Read More
China Is Targeting America’s Critical Infrastructure. Here’s What You Can Do About It.
Read More
How Quality Data Builds the Foundation for Machine Learning in Cybersecurity
Read More
How to Overcome Vulnerability & Patch Management Challenges in Your OT Environment
Read More
FBI’s Internet Crime Report Discloses 3,700+ Ransomware Attacks in 2021
Read More
Massive DDoS Attack Hits Israel
Read More
Cyber Incident Reporting for Critical Infrastructure Act Signed Into Law
Read More
Biden Administration Announces Plan for Electric System Cybersecurity
Read More
NIST Releases Draft of Cybersecurity Framework Profile for Ransomware Risk Management
Read More
An Overview of the Proposed Revisions to NERC CIP-004 and CIP-011
Read More
Meat Packing Giant JBS Hit with Cyberattack
Read More
DHS Issues Pipeline Cybersecurity Directive
Read More
An Overview of CISA’s ICSA-21-056-03 Advisory for Rockwell Automation Logix Controllers
Read More
Biden Extends Huawei Ban and Issues New Guidance on Improving Cybersecurity
Read More
Florida Water Treatment Plant Hit With Cyber Attack
Read More
How to Create an EDR/MDR Alternative for OT Systems
Read More
Managing Cybersecurity for Renewable Energy Resources
Read More
Summary of NERC CIP Requirements
Read More
Using the NIST CSF Security Controls to Prevent and Recover from Ransomware
Read More
What Is NERC CIP: The Ultimate Guide
Read More
7 Questions to Ask When Choosing an OT Cybersecurity Solution
Read More
OT Cybersecurity: The Ultimate Guide
Read More
Satellite Cybersecurity Act of 2022 Highlights Growing Importance of Satellite Networks in Critical Infrastructure
Read More
How to Centralize OT Security Data in a SIEM
Read More
NRECA's Co-op Cyber Tech
Event Details
Industrial Defender Wins Cybersecurity Excellence Awards for OT Security and Compliance
Industrial Defender Announces Strategic Technology Partnership with Dragos to Secure Critical Operations
Industrial Defender Appoints OT Cybersecurity Veteran Patrick Miller as Strategic Technical Advisor
Industrial Defender Joins the E-ISAC Vendor Affiliate Program, Strengthening Collaboration and Cybersecurity in the Electricity Sector
Introducing Industrial Defender Risk Signal, an Intelligent Risk-Based Vulnerability Management Solution for OT Security
Industrial Defender Appoints Power Industry Luminary Joy Ditto as Strategic Advisor
The Future of Asset Management in Operational Technology
Industrial Defender Launches Phoenix: A Quick-Start OT Visibility & Security Solution for Small to Medium Sized Operations
Industrial Defender Launches 7.5 Platform: A Unified Source for Operational Asset Data
Industrial Defender Partners with Nozomi Networks to Extend Endpoint Security Capabilities in Industrial Environments
Industrial Defender Appoints Gabe Authier as Chief Product Officer
Industrial Defender Appoints Aaron Crow as Chief Technology Officer
Industrial Defender Releases Inaugural State of OT Cybersecurity Research Survey Report
Industrial Defender Appoints Jay Williams as Chief Executive Officer
Rising threats spark US scramble for cyber workers
Forbes Expert Panel - 13 Tech Areas, Functions And Laws Facing New Or Potential Government Oversight
Colonial Pipeline was cyber wake-up call; Ukraine war is escalator
Industrial Defender Unveils New OT Vulnerability Management Solution, Immunity by ID™
Industrial Defender and GrayMatter Team Up to Equip Energy and Water Companies with Holistic Cybersecurity Defenses
Oil and gas industry scrutinized for weak cyber defenses
Need for critical infrastructure sector to shore up cyber defenses, amid geopolitical tensions
Industrial Defender Opens European Office in the Netherlands to Meet Increasing Global Demand for OT Cybersecurity
4 Tips to Secure the OT Cybersecurity Budget You Require
Why Cyber Due Diligence Is Essential to the M&A Process
Security leaders on how to cope with stress of Log4j
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2022 Cybersecurity Excellence Awards
Industrial Defender 7.4 Centralizes Data Collection, Offers Customized Risk Calculations to Secure OT Environments
Watch: Industrial Defender Featured in Congressional Transportation Committee Hearing
Industrial Defender and BridgeWare Partner to Bring Operational Technology Cybersecurity to Korea
Video: Digital Anarchist Interviews CEO Jim Crowley On National Security Directive
Podcast: CS2AI Becoming an Effective Leader in Technology Control Systems
Industrial Defender Delivers Industry-First OT Machine Learning Engine Using Both Network and Endpoint Data
Industrial Defender and Fetch Automation Partner to Deliver Operational Technology Cybersecurity and Compliance Solutions for Australia
Executive Q&A: Cyberattack Warnings and Trends
The Need to Protect Digital Infrastructure Highlights This ETF
Don't Let Cybercriminals Ruin your Merger or Acquisition–Follow This Expert's Advice
Russia, China, Cyber War, and Letters of Marque and Reprisal
Industrial Defender Partners with Diverse Solutions Engineering to Bridge the Gap Between Cybersecurity and Safety for Oil, Gas and Petrochemical Organizations
Industrial Defender CEO Jim Crowley Quoted on ToolboxTech.com
Industrial Defender Named Hot Company in OT Vulnerability Management by Cyber Defense Magazine in the Global InfoSec Awards
Industrial Defender ASM for Splunk App Delivers Deeper Contextual Data for Faster Response to Security Events
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2021 Cybersecurity Excellence Awards
Industrial Defender and aeCyberSolutions Join Forces to Elevate OT Cybersecurity Assessments for Energy and Maritime Companies
Rand McNally Selects Industrial Defender to Secure Its Industrial Internet of Things
Industrial Defender and Technomak Partner to Secure Critical Infrastructure in the Middle East
Industrial Defender Launches CopilOT Service™ to Address Cybersecurity Talent Shortage for Critical Infrastructure Companies
Industrial Defender Establishes IT-OT Integration Lab to Virtually Research, Develop and Evaluate ICS Cybersecurity Technologies
Industrial Defender and aDolus Partner to Secure ICS Supply Chain with Independent File Validation
Industrial Defender and FoxGuard Solutions Team Up to Transform Patch and Vulnerability Management for OT Security Teams
Industrial Defender and Waterfall Security Solutions Partner to Safely Transmit Cybersecurity Data in Operational Technology Environments
Industrial Defender Strengthens OT Asset Anomaly Detection Platform and Assisted Passive Network Monitoring Engine to Automate Risk Quantification and Reporting
Teleo Capital Completes Acquisition of Industrial Defender from CapGemini America
Webinar: Defending Against Attackers who use AI as a Weapon
Watch Webinar
Webinar: Surviving the Wave of Cyber Threats and Regulations: The Information Industrial Operators Need
Watch Webinar
Webinar: Revisiting the Fundamental Mission of NERC-CIP: Improving Reliability & Security - with Special Guest Speaker: Joy Ditto
Watch Webinar
Webinar: Practical Strategies for Remote Access Security in Bulk Electric Systems: Tackling New NERC CIP-003-9 Requirements
Watch Webinar
Webinar: NIS2 Compliance for OT Operators - What You Should Be Doing Today
Watch Webinar
Webinar: Preparing for NERC-CIP's INSM Requirements
Watch Webinar
Breaking Down TSA’s Revised Security Directive: What Pipeline Operators Need to Know
Watch Webinar
Webinar: Shadow OT — Keeping the World’s Lights on With the OT Security Add-on for Splunk
Watch Webinar
Webinar: Managing OT Data
Watch Webinar
Webinar: Prepare and Prevent: Using the AESCSF to Prepare for the SLACIP Bill 2022
Watch Webinar
Webinar: Why Do Ransomware Gangs Target Private Equity Portfolio Companies?
Watch Webinar
Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond
Watch Webinar
OT Security 101 Training: How to Get Started
Watch Webinar
Webinar: Why Hasn't SOAR Taken Off in OT?
Watch Webinar
Webinar: How to Navigate Operational Technology (OT) Cybersecurity in Port Environments
Watch Webinar
Webinar - Breaking Down TSA’s Cybersecurity Requirements for Pipeline Operators: What to Do Now
Watch Webinar
Webinar - Squashing Spreadsheets: How to Orchestrate OEM Patch & Vulnerability Management
Watch Webinar
Webinar: What’s Hiding in Your Software? How SBOMs Reduce Supply Chain Risk
Watch Webinar
Webinar: Are You Using MITRE ATT&CK for ICS Correctly?
Watch Webinar
Webinar: How to Build a Cybersecurity Strategy for Your Building Management System
Watch Webinar