Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Network Security

Industrial Defender Launches Managed Services to Protect Critical Infrastructure Endpoints

Industrial Defender, a provider of security and compliance solutions for automation systems, today announced new Managed Security Services for Automation Systems, targeting potential customers in critical infrastructure sectors, including utilities, chemical, water, oil and gas.

Industrial Defender, a provider of security and compliance solutions for automation systems, today announced new Managed Security Services for Automation Systems, targeting potential customers in critical infrastructure sectors, including utilities, chemical, water, oil and gas.

Industrial Defender LogoAs part of what the company calls its “Sustainability Services portfolio,” the new continuous monitoring and management services lets critical infrastructure operators utilize Industrial Defender’s expertise in protecting endpoints in critical infrastructure environments.

Through its managed service offerings, Industrial Defender helps customers protect critical assets, including remote terminal units (RTUs), programmable logic controllers (PLCs), intelligent electronic devices (IEDs), and human-machine interfaces (HMIs), while maintaining full administrative control of every device.

“The functions of industrial devices are specific and the implications of making changes may be significant,” said Brian Ahern, president and CEO of Industrial Defender. “To effectively secure an automation environment requires a deep understanding of how industrial endpoints operate and the role they play in supporting the organization’s requirements. These unique services allow subscribers to leverage our expertise which enables customers to ensure their essential resources maintain a focus on driving operational excellence.”

Monitor solution: Industrial Defender’s integrated Monitor technology solution delivers security event management and automation system agent technology. Through managed services for this solution, Industrial Defender provides:

• Monitoring security, application and system events across industrial endpoints

• Monitoring security events originating via network intrusion detection systems

• Monitoring health and status of industrial endpoints on an ongoing basis

Advertisement. Scroll to continue reading.

• Identifying, triaging and escalating high priority events to mitigate potential risk

Management Solution: Industrial Defender’s Manage technology solution provides security event management, compliance management and automation system agent technology. Managed services for this solution include all capabilities described under the Monitor solution, plus:

• Management of compliance for industrial endpoints

• Monitoring and management of critical system attributes such as configurations, patch status, and user accounts, among others

• Generating compliance reports; delivering reports; managing report subscriptions

• Identification and reporting of configuration deviations from customer baselines, including installed applications, patch levels, ports and services

Protection Solution: Industrial Defender’s Protect technology solution delivers host intrusion prevention, and, optionally, unified threat management/firewall, alongside security management and compliance management. Through managed services for this solution, Industrial Defender provides all services described under the Monitor and Manage solutions, as well as:

• Monitoring events originating from host intrusion prevention system

• Managing changes to the Industrial Defender solution

• Maintaining release level patches of the solution

• Administering user accounts within the solution

• Maintaining the initial whitelist policy, as well as ongoing whitelist policy updates

• Updating endpoint policies associated with whitelisting

• Removing unauthorized applications from whitelisted endpoints

• Ongoing management and tuning of NIDS signatures

Industrial Defender’s Managed Security Services for Automation Systems are available immediately.

Foxborough, Massachusetts based Industrial Defender counts 350 companies in 21 countries as customers.

Related Reading: Industrial Control Systems Security One Year After Stuxnet

Related Reading: Bridging the Air Gap: Examining Attack Vectors into Industrial Control Systems

Related Reading: Are Industrial Control Systems Secure?

Related Reading: How to Make the Smart Grid Smarter than Cyber Attackers

Related Reading: The Increasing Importance of Securing The Smart Grid

Related Reading: Stuck on Stuxnet – Are Grid Providers Prepared for Future Assaults?

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...