Flexible, Multi-Layered Architecture

Indegy’s ICS cyber security architecture leverages our expertise in OT systems as well as our in-depth working knowledge of enterprise IT environments. This flexible and resilient architecture for industrial networks is designed to enable visibility, security and control across OT and IT environments with a minimal signature in the infrastructure.

The Indegy Industrial Cybersecurity Suite comprises three layers. You have the flexibility of using one, two or all three to meet your organization's security needs. This multi-layered approach also helps maximize investment value across the security ecosystem. Zero touch deployment and easy integration with existing security tools further enhances collaboration and coverage across IT and OT networks.

Appliance icon

Indegy Security Platform

All-in-one turnkey appliance that can be deployed physically or as a virtual instance. Indegy Security Platform collects data using network traffic mirroring and the device integrity functionality.

IEM icon

Indegy Enterprise Manager

Indegy Enterprise Manager provides enterprise-wide visibility, security and control by aggregating and correlating events across sites and populating both policies and configurations to the Indegy Security Platforms across the entire enterprise.

Senson icon

Indegy Sensors

Optional lightweight devices for supporting multi segment network topologies. Indegy Sensors are available in rack mount or DIN-rail mount form factors.

Indegy Three-Tier-Deployment-Model Diagram

Three-Tier Deployment Model

The Indegy Security Platform analyzes information and handles user interaction for a single location. The Indegy Sensors extend the Platform reach by aggregating data from remote networks and subnets. The Enterprise Manager is the top tier that enables both enterprise-wide visibility and control. This model enables maximum flexibility while keeping deployment painless and seamless in highly distributed and complex architectures.

Built for Your Environment

Grid Image
Zero Touch Deployment

Intuitive, web-based setup wizard makes deployment simple. No deployment-specific pre-configuration needed.

Indegy Architecture Guide Bucket Image

Zero Touch Deployment

The Indegy Industrial Cybersecurity Suite is 100% agentless and non-intrusive. A typical deployment takes less than an hour. Flexible deployment options, including rack mount and DIN-rail mount form factors as well as virtual appliances, are available to fit the specific needs of any industrial network environment.

Grid Image
Extensive Integration API

Create a security ecosystem with easy integration using REST based APIs.

Indegy Architecture Guide Bucket Image

Extensive Integration API

Indegy offers a fully documented REST API, purpose-built for third party or custom application use. Indegy's API enables partners to integrate all features provided in the full security suite. API access simplifies all types of 3rd party bidirectional integrations and facilitates data mining, research and forensic-based activities on the data Indegy gathers.

Grid Image
Ruggedized Hardware

Designed specifically for the toughest industrial environments found in critical infrastructure facilities.

Indegy Architecture Guide Bucket Image

Ruggedized Hardware

Indegy’s Industrial Cyber Security Suite hardware is designed specifically to withstand the challenging physical conditions typically found in critical and industrial infrastructures. The rugged platform was architected for operation in harsh, unmanned environments and extreme weather conditions. Both rackmount and DIN-rail mount form factors are available, supporting various configurations and architectures.

Grid Image
Passive-Only Deployment

Passive-only network monitoring option without Device Integrity querying.

Indegy Architecture Guide Bucket Image

Passive-Only Deployment

The passive-only or “listening mode” deployment option is enabled by not activating the Device Integrity module, and only connecting to the relevant span ports. This option provides the best network-based threat detection and visibility by leveraging both anomaly and policy-based detection technology. To add device-based querying, you will need to activate Device Integrity.

Grid Image
Active-Only Deployment

Optional querying-based solution for situations where network monitoring is impossible.

Indegy Architecture Guide Bucket Image

Active-Only Deployment

The Active-Only deployment option is designed for cases where it is not possible to use network traffic mirroring, such as in an environment that doesn’t have managed switches or the means to tap into some or all of the network switches. This querying-based solution is 100% active and comprehensive, without relying on network traffic analysis.

Industrial Cyber Security

Create a Trusted Ecosystem

Indegy’s Industrial Cyber Security Suite integrates with many security and monitoring devices already deployed in your environment.

Learn More