Industrial Defender ASM®
Industrial Defender ASM® is made specifically for complex industrial control system (ICS) environments to protect the availability and safety of these systems, while also simplifying compliance requirements. It provides a solid foundation to apply effective OT security controls using an asset-centric methodology for endpoint data collection and normalization.
The ASM platform also enhances IT and OT collaboration with integrations that deliver enterprise-level visibility, access and situational awareness into critical ICS environments.
Three Challenges
for Industrial Control Systems
![]() |
CybersecurityCollect, monitor, and manage security data for OT assets at scale |
![]() |
ComplianceAutomate compliance with regulations, internal policies and industry standards, including NERC CIP, NIST, NIS Directive, ISA 99/IEC 62443, 20 CIS Controls, and NEI. |
![]() |
Configuration ManagementTrack and audit system configurations to detect anomalies in your firmware, software, device settings, firewall rules, ports & services, and more. |
One Solution
Industrial Defender ASM®
Asset Management |
|
Security Event Management |
|
Configuration Management |
|
Vulnerability Monitoring |
|
Policy Management |
|
Automated Compliance Reporting |
|
Risk & Network Analytics |
|
Enterprise Integration |
Key benefits of Industrial Defender ASM® include:
Asset Management
You can’t secure what you don’t know you have.

View your entire asset base from a single pane of glass | |
Easily onboard and decommission assets |
|
Understand how your assets are changing over time |
|
Visualize deployed assets with asset topology |
Security Event Management
Actionable intelligence from your control systems.

Analyze asset trends |
|
Improve situational awareness |
|
Monitor system performance |
|
Detect anomalies |
|
Triage alerts |
|
Generate reports |
Vulnerability Monitoring
Combine incredibly accurate OT asset data with the power of NIST’s vulnerability database and ICS-CERT threat alerts.

Track and audit installed software and firmware inventory |
|
Compare your assets to NIST’s vulnerability database |
|
Generate a report of Common Vulnerabilities and Exposures (CVEs), plus available patches |
|
Make better patching, auditing and maintenance decisions |
Configuration & Change Management
Monitor and manage changes down to the last mile.

Manage configuration rules remotely |
|
Reduce manual activities by 80% |
|
Eliminate configuration drift |
|
Effortlessly report any changes for compliance |
Automated Compliance Reporting
A suite of built-in compliance reporting templates for a variety of standards and regulations.

NERC CIP |
|
NIST Cybersecurity Framework |
|
20 CIS Controls |
|
ISA 99/IEC 62443 |
|
NIS Directive |
|
NEI |
Policy Management
Easily create, deploy, and audit policies across your ICS environment.

Communicate new policies |
|
Track acceptance |
|
Manage conformance |
|
Always be audit-ready |
Network Analytics
Make sense of your passive network monitoring data.

Drill into asset status at a glance |
|
Visualize where, how and with whom assets are communicating |
|
Identify open ports and services and the IP addresses using them, domain names and locations, the top inbound/outbound external communicators, and more. |
|
Enjoy a better user experience when analyzing passive network monitoring data |
Risk Analytics Suite
Quantifying cyber risk has become a board-level priority.

Automatic overall risk scores for OT endpoints |
|
Track threat vectors like security events, baseline deviations, vulnerabilities and health status |
|
Uses both endpoint and network data to quantify risk, with full transparency into scoring methodology |
|
Improve IT-OT collaboration |
Enterprise Integrations
API-enabled integrations feed detailed OT asset data into the broader security and enterprise ecosystem.

SIEMs |
|
CMDBs |
|
ITIL ticketing systems |
|
Business intelligence tools |
|
And more |