Security Suite Bridges IT/OT Divide

Indegy’s ICS Security Suite is said to deliver unparalleled end-to-end visibility into operational technology (OT) cyber threats, vulnerabilities, assets, and their configurations. It provides purpose built OT security monitoring that has traditionally been lacking in industrial networks, and matches IT-grade standards for control and audit.


Vulnerability Management

Fierce AI Week

Register today for Fierce AI Week - a free virtual event | August 10-12

Advances in AI and Machine Learning are adding an unprecedented level of intelligence to everything through capabilities such as speech processing and image & facial recognition. An essential event for design engineers and AI professionals, Engineering AI sessions during Fierce AI Week explore some of the most innovative real-world applications today, the technological advances that are accelerating adoption of AI and Machine Learning, and what the future holds for this game-changing technology.


To detect threats, Indegy’s automated vulnerability management capabilities build a continuously updated security risk profile for each asset based on its criticality level and by monitoring the following:

  • Open and misused network ports
  • Security hotfixes deployed on MS-Windows machines, including servers, workstations, desktops, SCADA terminals and HMIs
  • Cybersecurity vulnerabilities on the devices in the environment, based on CVE scoring


This enables organizations to identify and remediate threats before they can be exploited.


Backplane Configurations


In order to assess cyber risk and ensure operational reliability and safety, industrial operators need to identify and track assets, plus control their configurations. New automated asset management capabilities monitor and maintain a complete inventory of industrial controllers, their settings and backplane configurations, including:

  • Firmware and OS versions
  • Patch levels
  • Module names, models and serial numbers
  • Usage statistics, and more


This detailed visibility can be used to recover from incidents and restore devices to a "known good" state, provide asset tracking for compliance and support capacity planning.


Full Packet Capture Retention


To automate and simplify forensic investigations and incident response, Indegy retains full packet captures of all the traffic in a monitored network. This comprehensive recording of activity allows the Indegy ICS Security Suite to provide extended visibility into anomalous behaviors, reconnaissance and intrusions by maintaining a complete and continuous audit trail.


 Indegy ICS Security Suite v2.4 is available immediately. For further insights and enlightenments, checkout the Indegy Industrial Cyber Security Suite.


Suggested Articles

One forecast from Cameron Chell: the best AI designers of the future won’t come from top universities

Survey of 30 chipmakers offers a good sign for research and development of self-driving vehicles, analyst says

Research dollars for AV are expected to remain, if slowed, especially for companies that see self-driving as a key to their success