OT Asset Management

OT Asset Visibility & Management in One Place

Safely collect, monitor and manage OT asset data at scale

View Solution Brief
Get In Touch

Key Benefits

ID20-112_Icons-35
Automate OT asset inventory data collection using agent, agentless and passive methods
ID20-112_Icons-01
Quantify endpoint risk with a transparent scoring methodology
ID20-112_Icons-09
Manage configuration rules for ports & services, users, software, patches and firewall rules
ID20-112_Icons-35_2
Create, deploy, and audit policies across your OT environment
ID20-112_Icons-33
Easily onboard and decommission assets with just a few clicks
ID20-112_Icons-10
Experience turnkey deployments across all major industrial control system vendors

Our OT Asset Management Platform Tracks & Audits:

Device Configuration Data

  • Installed firmware and software inventory, including versions
  • OS, including version and patches installed
  • Open ports and services
  • Removable media installed
  • Malicious code detected/AV
  • Failure of event logging
  • Serial number
  • Policies modified

System Access & Authentication

  • Successful and failed login attempts
  • Generic and shared user accounts
  • Local and A/D accounts
  • Password parameters and age
  • User account locked
  • Policies modified
  • Privilege raised
  • Failure of event logging

Firewall Information & Events

  • Firewall rules, including change detection
  • Blocked execution (packet)
  • Blocked unauthorized file
  • Policies modified

Asset Resource Utilization & Status

  • CPU usage over time
  • RAM usage over time
  • Disk space
  • Swap space
  • Connectivity lost
  • Shutdown
  • Rebooted and boot checksum
  • Backup failure

*This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.

Take a guided tour of the product with one of our knowledgeable staff members.

  • Centralized OT asset management
  • Real-time cyberattack detection and alerting
  • Vulnerability monitoring
  • Automated standards & compliance reporting

Request Your Demo

Resources

Implementation Guide: The 20 CIS Controls for ICS Cybersecurity

Learn about the 20 CIS controls for ICS cybersecurity according, including cyber risk mitigation, audit success and operational efficiency.

Case Study: Cybersecurity for Chemical Manufacturing

Download this white paper on cybersecurity for chemical manufacturing to learn how a Fortune 500 company used ASM to monitor their PCN network.

Solution Brief: Safely Collect, Monitor & Manage OT Asset Data at Scale

Multiple vendor systems, geographically dispersed plants and hard-to-reach endpoints make it difficult to effectively manage OT asset data. Industrial Defender has the solution.