Assessment Service Pinpoints Industrial Security Risks

Indegy offers a risk assessment service that enables organizations to quickly and affordably assess security risk exposures in their operational technology environments right down to individual controller configurations. Following the recent United States Computer Emergency Readiness Team (US-CERT) technical alert which revealed that attacks were already underway against critical infrastructure sectors, many industrial organizations are re-evaluating their security risk management practices. The Indegy Risk Assessment Service enables executives, managers, security analysts and automation engineers to immediately understand the specific vulnerabilities and security gaps in their environments.


The service provides a comprehensive view that identifies risks, maps them to their origin, and scores the severity to provide a blueprint for remediation. It takes into account cyber threats, malicious insider security alerts, known vulnerabilities and specific control device configurations that may expose them to potentially malicious threats.

Fierce AI Week

Register today for Fierce AI Week - a free virtual event | August 10-12

Advances in AI and Machine Learning are adding an unprecedented level of intelligence to everything through capabilities such as speech processing and image & facial recognition. An essential event for design engineers and AI professionals, Engineering AI sessions during Fierce AI Week explore some of the most innovative real-world applications today, the technological advances that are accelerating adoption of AI and Machine Learning, and what the future holds for this game-changing technology.


Providing visibility into ICS risk, the service combines advanced network traffic monitoring and analysis with patent-pending device-integrity assessment capabilities to generate a complete and detailed security risk assessment report for industrial networks. The service builds a risk profile for each asset using a wide range of signals and details that span inventory and assets, controller activity, traffic activity, network access and control, published vulnerabilities, and open ports. To find out more and request a security risk assessment, visit Idegy Industrial Cyber Security and Anatomy of ICS Attacks.

Suggested Articles

One forecast from Cameron Chell: the best AI designers of the future won’t come from top universities

Survey of 30 chipmakers offers a good sign for research and development of self-driving vehicles, analyst says

Research dollars for AV are expected to remain, if slowed, especially for companies that see self-driving as a key to their success