Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

Lockheed Martin to Acquire Industrial Defender

Lockheed Martin, the largest provider of IT services, systems integration, and training to the U.S. Government, said Wednesday that it would acquire a privately held Industrial Defender, a provider of cyber security solutions for control systems in the oil and gas, utility and chemical industries.

Lockheed Martin, the largest provider of IT services, systems integration, and training to the U.S. Government, said Wednesday that it would acquire a privately held Industrial Defender, a provider of cyber security solutions for control systems in the oil and gas, utility and chemical industries.

“Industrial Defender’s expertise in cyber security for critical infrastructure is a natural extension of our commercial cyber security business,” said Marillyn Hewson, Lockheed Martin Chairman, President and CEO. “Their experience in addressing cyber threats to industrial control systems complements our information technology cyber security expertise and strengthens the value we deliver to our customers.”

Foxborough, Mass.-based Industrial Defender has more than 130 employees in three facilities and claims more than 400 companies in 25 countries as customers.

Industrial Defender’s solutions help critical infrastructure companies manage the availability, reliability and security of infrastructure, such as electric power grids, chemical facilities, and oil and gas pipelines.

“Lockheed Martin is a leader in cyber technology and IT security,” said Industrial Defender CEO Brian M. Ahern. “We share a common perspective on the importance of protecting global critical infrastructure from an increasingly hostile threat landscape. The combined capabilities of Industrial Defender and Lockheed Martin will enable us to offer a comprehensive suite of technology and services designed to face modern day threats and business challenges to both enterprise information and operational technologies. Joining forces is a natural fit for Industrial Defender and our growth plans.”

The terms of the agreement were not disclosed and the acquisition is expected to close within 30 days.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Register

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...