Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Industrial Defender Launches Managed Services to Protect Critical Infrastructure Endpoints

Industrial Defender, a provider of security and compliance solutions for automation systems, today announced new Managed Security Services for Automation Systems, targeting potential customers in critical infrastructure sectors, including utilities, chemical, water, oil and gas.

Industrial Defender, a provider of security and compliance solutions for automation systems, today announced new Managed Security Services for Automation Systems, targeting potential customers in critical infrastructure sectors, including utilities, chemical, water, oil and gas.

Industrial Defender LogoAs part of what the company calls its “Sustainability Services portfolio,” the new continuous monitoring and management services lets critical infrastructure operators utilize Industrial Defender’s expertise in protecting endpoints in critical infrastructure environments.

Through its managed service offerings, Industrial Defender helps customers protect critical assets, including remote terminal units (RTUs), programmable logic controllers (PLCs), intelligent electronic devices (IEDs), and human-machine interfaces (HMIs), while maintaining full administrative control of every device.

“The functions of industrial devices are specific and the implications of making changes may be significant,” said Brian Ahern, president and CEO of Industrial Defender. “To effectively secure an automation environment requires a deep understanding of how industrial endpoints operate and the role they play in supporting the organization’s requirements. These unique services allow subscribers to leverage our expertise which enables customers to ensure their essential resources maintain a focus on driving operational excellence.”

Monitor solution: Industrial Defender’s integrated Monitor technology solution delivers security event management and automation system agent technology. Through managed services for this solution, Industrial Defender provides:

• Monitoring security, application and system events across industrial endpoints

• Monitoring security events originating via network intrusion detection systems

• Monitoring health and status of industrial endpoints on an ongoing basis

• Identifying, triaging and escalating high priority events to mitigate potential risk

Advertisement. Scroll to continue reading.

Management Solution: Industrial Defender’s Manage technology solution provides security event management, compliance management and automation system agent technology. Managed services for this solution include all capabilities described under the Monitor solution, plus:

• Management of compliance for industrial endpoints

• Monitoring and management of critical system attributes such as configurations, patch status, and user accounts, among others

• Generating compliance reports; delivering reports; managing report subscriptions

• Identification and reporting of configuration deviations from customer baselines, including installed applications, patch levels, ports and services

Protection Solution: Industrial Defender’s Protect technology solution delivers host intrusion prevention, and, optionally, unified threat management/firewall, alongside security management and compliance management. Through managed services for this solution, Industrial Defender provides all services described under the Monitor and Manage solutions, as well as:

• Monitoring events originating from host intrusion prevention system

• Managing changes to the Industrial Defender solution

• Maintaining release level patches of the solution

• Administering user accounts within the solution

• Maintaining the initial whitelist policy, as well as ongoing whitelist policy updates

• Updating endpoint policies associated with whitelisting

• Removing unauthorized applications from whitelisted endpoints

• Ongoing management and tuning of NIDS signatures

Industrial Defender’s Managed Security Services for Automation Systems are available immediately.

Foxborough, Massachusetts based Industrial Defender counts 350 companies in 21 countries as customers.

Related Reading: Industrial Control Systems Security One Year After Stuxnet

Related Reading: Bridging the Air Gap: Examining Attack Vectors into Industrial Control Systems

Related Reading: Are Industrial Control Systems Secure?

Related Reading: How to Make the Smart Grid Smarter than Cyber Attackers

Related Reading: The Increasing Importance of Securing The Smart Grid

Related Reading: Stuck on Stuxnet – Are Grid Providers Prepared for Future Assaults?

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.