Industrial Cybersecurity | Industrial Defender


Industrial Cybersecurity Solutions

Industrial Defender ASM® collects both configuration state and event data, supporting regulatory compliance requirements and industrial cybersecurity monitoring efforts.

Monitoring is the first step in building a unified security and compliance management strategy that supports operational requirements. The centralized collection, correlation and archiving of events enables critical infrastructure owners, security analysts, control engineers and operators to quickly identify and respond to operational and security threats in their ICS. Monitoring is the backbone of a sustainable security and compliance capability by providing situational awareness.

The ASM collects both configuration state data and event data. The data collected supports regulatory compliance requirements as well as security monitoring.

Learn how Industrial Defender mitigates OT cyber risks for large oil & gas companies.
Read White Paper

Common Security Events Monitored by Industrial Defender ASM®

Asset Configuration State Data
For detection of changes

Installed software inventory including versions
OS including version and patches installed
Firmware including version
Listening ports and services
Local firewall rules (including change detection)
Removable media installed (e.g. USB device)
Malicious code detected/AV
Failure of event logging

User Accounts

Generic and shared user accounts
Local and A/D accounts
Password parameters and age

System Access and Authentication

Failed login and access attempts
Successful logins
User account locked
Policies modified
Privilege raised
Removable media installed (e.g. USB device)
Malicious code detected/AV
Failure of event logging

Firewall Information & Events

Firewall rules (including change detection)
Blocked execution (packet)
Blocked unauthorized file
Policies modified

Asset Resource Utilization

CPU usage over time
RAM usage over time
Disk space
Swap space

Device Status

Connectivity lost
Rebooted and boot checksum
Backup failure

Device Configuration

Serial number
Interface board(s)
Mainboard parameters
Policies modified

This list is not all encompassing. The data collected varies for each device, dependent upon the manufacturer, model, and version.