Industrial Defender ASM®

Industrial Defender ASM®

Industrial Defender ASM® is made specifically for complex industrial control system (ICS) environments to protect the availability and safety of these systems, while also simplifying compliance requirements. It provides a solid foundation to apply effective OT security controls using an asset-centric methodology for endpoint data collection and normalization. 

The ASM platform also enhances IT and OT collaboration with integrations that deliver enterprise-level visibility, access and situational awareness into critical ICS environments.

View Solution Brief

Three Challenges

for Industrial Control Systems

Cybersecurity

Collect, monitor, and manage security data for OT assets at scale

Compliance

Automate compliance with regulations, internal policies and industry standards, including NERC CIP, NIST, NIS Directive, IS/IEC 62443, 20 CIS Controls, and NEI.

Configuration Management

Track and audit system configurations to detect anomalies in your firmware, software, device settings, firewall rules, ports & services, and more.  

One Solution

Industrial Defender ASM®

Asset Management

Security Event Management

Configuration Management

Vulnerability Monitoring

Policy Management

Automated Compliance Reporting

Risk & Network Analytics

Enterprise Integration

Key benefits of Industrial Defender ASM® include:

A single security platform incorporating unique methods for endpoint data collection and normalization to tune out noise and provide the foundation for applying OT security controls.

Security teams receive the data they really need, including how important an industrial device is, where it’s located, and who to call at the plant if anomalies are detected in that asset.

Passive, on-demand vulnerability monitoring delivers actionable security data to mitigate threats.

Automated policy management and built-in reporting templates for NERC CIP, NEI, NIST, IEC 62443, and the NIS Directive streamline compliance efforts.

API-enabled integrations and turnkey deployments across all major ICS vendors deliver the lowest TCO in the industry.

Asset Management

You can’t secure what you don’t know you have.

View your entire asset base from a single pane of glass
Easily onboard and decommission assets
Understand how your assets are changing over time
Visualize deployed assets with asset topology

Security Event Management

Actionable intelligence from your control systems.

Analyze asset trends
Improve situational awareness
Monitor system performance
Detect anomalies
Triage alerts
Generate reports

Vulnerability Monitoring

Combine incredibly accurate OT asset data with the power of NIST’s vulnerability database and ICS-CERT threat alerts.

Track and audit installed software and firmware inventory
Compare your assets to NIST’s vulnerability database
Generate a report of Common Vulnerabilities and Exposures (CVEs), plus available patches
Make better patching, auditing and maintenance decisions

Configuration & Change Management

Monitor and manage changes down to the last mile.

Manage configuration rules remotely
Reduce manual activities by 80%
Eliminate configuration drift
Effortlessly report any changes for compliance

Automated Compliance Reporting

A suite of built-in compliance reporting templates for a variety of standards and regulations.

NERC CIP
NIST Cybersecurity Framework
20 CIS Controls
ISA 99/IEC 62443
NIS Directive
NEI

Policy Management

Easily create, deploy, and audit policies across your ICS environment.

Communicate new policies
Track acceptance
Manage conformance
Always be audit-ready

Network Analytics

Make sense of your passive network monitoring data.

Drill into asset status at a glance
Visualize where, how and with whom assets are communicating
Identify open ports and services and the IP addresses using them, domain names and locations, the top inbound/outbound external communicators, and more.
Enjoy a better user experience when analyzing passive network monitoring data

Risk Analytics Suite

Quantifying cyber risk has become a board-level priority.

Automatic overall risk scores for OT endpoints
Track threat vectors like security events, baseline deviations, vulnerabilities and health status
Uses both endpoint and network data to quantify risk, with full transparency into scoring methodology
Improve IT-OT collaboration

Enterprise Integrations

API-enabled integrations feed detailed OT asset data into the broader security and enterprise ecosystem.

SIEMs
CMDBs
ITIL ticketing systems
Business intelligence tools
And more

Industrial Defender ASM®

Request a Demo

See for yourself how Industrial Defender ASM® provides:

  • Real-time cyberattack detection and alerting
  • Vulnerability monitoring
  • Automated standards & compliance reporting