As industrial processes get more complex, manually managing the code and configuration changes made to controllers is virtually impossible. Should the worst happen, having the last known good configuration of all industrial devices is paramount. To enable effective backup and recovery, you need reliable tracking and control of all hardware and configuration changes.

Automated configuration change management puts you in control

icon_features

Track changes performed remotely

Indegy network monitoring identifies every remote interaction that changes the configuration of a controller with elaborate activity details.

icon_features

Identify changes performed locally

Indegy Device Integrity uniquely allows detection and tracking of changes performed locally to controllers, as often happens in ICS environments.

icon_features

Version Control

Indegy gives you access to complete controller code snapshots, with a detailed history of ladder logic, firmware history, backplane hardware configuration and more.

Hybrid Security on Both Fronts

Network monitoring alone may leave organizations open to significant risks and threats. Learn about our active Device Integrity technology, which enables organizations to employ proactive security coverage across the most demanding ICS networks.

Tired of chasing controller configuration changes?

There are numerous ways to perform configuration and code changes to industrial controllers. Changes can be made remotely over the network, locally on the controllers via physical connections, or via temporary connections to remote network switches. Trying to manage configuration changes using manual procedures is error-prone and difficult to enforce, particularly in multi-vendor environments.

The Indegy Industrial Cybersecurity Suite employs multiple technologies to detect and record every change, without requiring manual user involvement. All changes are tracked and flagged, regardless of how or by whom they were performed. Combining continuous network traffic monitoring with active Device Integrity queries, Indegy ensures full configuration control and backup capabilities.

Gain Visibility into Controllers

Indegy gives you complete visibility and control into authorized and unauthorized activities affecting controller configurations v

Grid Image
Automatic change tracking

Our deep-packet inspection engine analyzes and tracks every communication with industrial controllers.

Screenshot of control plane event_engineering station to controller

Automatic change tracking

When engineering workstation commands are sent through the network, Indegy analyzes them in real time to extract the full context of each activity. This includes commands that instruct firmware changes, code updates, SFC and IO forcing, writes performed to setpoints, and more. The source, type and other activity details, down to the tag or code block that was changed are captured and stored. In addition, the system alerts the user on activities that violate organizational policies.

Grid Image
Controller baselining and versioning

Set a baseline configuration for changes to be compared to while keeping track of all code versions for quicker incident response.

Screenshot of a Single Controller Code revisions history

Controller baselining and versioning

Code snapshots extracted by Indegy are backed up and stored. Versions can be compared down to the rung, routine or code block level, depending on the programming language used. The user can set a specific code version as the baseline and receive alerts upon a change.

Grid Image
Full Controller verification

Periodic device integrity checks to verify the integrity of controller code and configuration.

Screenshot of the definition of a single policy

Full Controller verification

Indegy Device Integrity technology lets you periodically query controllers for their code and configuration for purposes of change management. It identifies changes to each controller’s meta-data and backplane, including firmware versions and configuration details, as well as changes in the code and critical memory segments. The frequency and timing of controller code verification is 100% user configurable. These device checks can also be run manually.

Grid Image
Event-triggered snapshots

Indegy automatically captures configuration snapshots based on network specific activity.

Screenshot of a Single Controller Code revisions history

Event-triggered snapshots

Upon detection of predefined communications with or operations on an industrial controller, Indegy automatically extracts the most up-to-date configuration from the controller. This snapshot then serves as a reference in case a subsequent restore operation is required. The triggering is fully configurable and can be set to specific times or activities. Event-triggered snapshots supplement the regular device querying performed by Indegy for backup purposes.

We Secure Your Industrial Operations

Asset Inventory

ICS Threat Detection

ICS Vulnerability Management

ICS Configuration Control

Critical Infrastructure Cybersecurity

Can you see a complete, detailed and automated asset inventory of your ICS environment?

Learn More

Do you have what for it takes to secure and control your ICS environment?

Learn More

Can you proactively identify and effectively mitigate vulnerabilities on ICS assets before it’s too late?

Learn More

Automatically track every configuration and code change in your ICS environment – whether performed remotely or locally, planned or accidental

Learn More

How can you implement IT/OT convergence without compromise?

Learn More
Industrial Cyber Security

Indegy Industrial Cyber Security Suite

Delivers end-to-end visibility, security and control for all OT activities by analyzing your security posture at the network and device levels

Learn More

We want to have as much control as possible about who is in our network. Indegy guarantees me that the firmware that's in my controller is what I put in it … and nothing's changed since then.

Paul Siegmund, Manager, Automation & Technology Services, PUD #1 of Whatcom County