Industrial Defender ASM
You can’t secure what you don’t know you have.
- View your entire ICS asset base from a single application
- Easily onboard and decommission assets
- Understand how your assets are changing over time
- Manage configuration rules remotely
Streamline security event management.
- Analyze asset trends
- Detect configuration anomalies
- Monitor system performance
- Generate reports
Combine accurate asset data with the power of NIST’s vulnerability database and ICS-CERT alerts.
- Track and audit installed software and firmware inventory
- Aggregate vulnerability data from a variety of sources
- See available patches on demand
- Make better decisions about emerging threats
NETWORK MONITORING & ANALYTICS
Make sense of your passive network monitoring data.
- Drill into asset status at a glance
- Visualize where, how and with whom assets are communicating
- Identify open ports and services and the IP addresses using them, domain names and locations, top inbound/outbound communicators, and more
- Enjoy a better user experience when analyzing passive network monitoring data
RISK ANALYTICS SUITE
Quantifying cyber risk is a board-level priority.
- Automatically quantify risk for each OT asset using both endpoint and network data
- Track individual threat vectors like security events, baseline deviations, vulnerabilities and health status
- Enjoy a completely transparent risk scoring methodology
- Improve IT-OT collaboration
Easily create, deploy, and audit policies across your ICS environment.
- Communicate new policies
- Track acceptance
- Manage conformance
- Always be audit-ready
AUTOMATED COMPLIANCE REPORTING
Built-in compliance templates for your standard.
- NERC CIP
- NIST Cybersecurity Framework
- 20 CIS Controls
- ISA 99/IEC 62443
- NIS Directive
Feed detailed OT asset data into the broader enterprise ecosystem.
- ITIL ticketing systems
- Business intelligence tools
- IAM/PAM solutions
- and more
Take a guided tour of the product with one of our knowledgeable staff members.
- Real-time cyberattack detection and alerting
- Vulnerability monitoring
- Automated standards & compliance reporting