Comprehensive ICS Cybersecurity

The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our ICS security capabilities maximize the safety and reliability of your operational environment.

Deployed as a network or virtual appliance, Indegy's agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.

Appliance Icon

Indegy Security Platform

This is the core component of the Indegy Suite, responsible for analyzing network traffic data, performing Device Integrity checks, and aggregating sensors' data.

Sensors Icon

Indegy Sensors

Optional, lightweight sensors provide full visibility into remote network segments by capturing, filtering and forwarding traffic to the Indegy Security Platform for further analysis.

IEM Icon

Indegy Enterprise Manager

Ideal for multi-site distributed environments, IEM enables enterprise-wide visibility and control by aggregating data from Indegy Security Platforms with centralized configuration and policy management.

Industrial Cyber Security

Flexible, All-in-One Industrial Cyber Security Solution

The Indegy Industrial Cybersecurity Suite is delivered as an all-in-one turnkey appliance that plugs into the network without the use of agents. The Indegy Security Platform is available in 1U Rack form factor as well as a virtual appliance, while the Indegy Sensors come in both rack mounts or DIN-rail mount form factors.

Secure Your Industrial Operations

Grid Image
Threat Detection & Mitigation

Find threats in real-time using Indegy's dual anomaly and policy-based detection engines.

Screenshot with all events with detail of source of event

Threat Detection & Mitigation

The Indegy Industrial Cybersecurity Suite detects and alerts you to threats coming from external and internal sources - whether human or malware based. Indegy identifies anomalous network behavior, enforces network security policies and tracks local changes on devices, enabling organizations to detect and mitigate risky events in their ICS environments. The Indegy Suite provides context-aware alerts with extended information, as well as a comprehensive audit trail for fast incident response and forensic investigations.

Grid Image
Asset Tracking

Detailed asset inventory management featuring automated discovery and classification of every ICS network device.

screenshot of all controllers and ICS modulers found in the network

Asset Tracking

Indegy's automated asset discovery and visualization capabilities provide a comprehensive up-to-date inventory of all network assets, including Workstations, Servers, HMIs, Historians, PLCs, RTUs, IEDs and network devices. Device Integrity capabilities enable discovery of dormant devices in the network’s "blind" zone and local-only data. The inventory contains unparalleled asset information depth – tracking firmware and OS versions, internal configuration, running software and users, as well as serial numbers and backplane configuration for both PCs and Industrial controllers.

Grid Image
Vulnerability Management

Proactively identify and remediate ICS vulnerabilities before they become a breach.

screenshot showing a list of all vulnerabilities identified in assets

Vulnerability Management

Drawing on our comprehensive and detailed asset tracking capabilities, Indegy automatically generates risk levels for each asset in your ICS network. These reports include risk scoring and detailed insights, along with mitigation suggestions. Our vulnerability assessment is based on various parameters such as firmware versions, relevant CVEs, proprietary Indegy Labs research, default passwords, open ports, hotfixes installed and more. This enables authorized personnel to quickly identify new vulnerabilities and efficiently mitigate risk factors in the network.

Grid Image
Configuration Control

End-to-end configuration tracking for efficient audits, backup and recovery, and compliance reporting.

Screenshot of a Single Controller Code revisions history

Configuration Control

Indegy tracks and logs all configuration changes executed by a user or by malware, whether over the network or directly on the device. It provides a full history of changes made to device configurations over time, including granularity of specific ladder logic segments, diagnostic buffers, tag tables and more. This enables users to establish a backup snapshot with the "last known good state" for faster recovery and demonstrate compliance with industry regulations.

Grid Image
Enterprise Visibility

Out-of-the-box integration with enterprise IT security tools for unprecedented IT & OT visibility.

screenshot of all sites appliances

Enterprise Visibility

Indegy creates complete enterprise visibility by integrating with leading IT security tools, such as SIEM alerts and activity reporting, Next Generation Firewalls, vulnerability management tools and more. The platform also shares information with CMDB, asset inventory platforms, change management tools and more. Our RESTful API is designed to facilitate extraction of data even to proprietary tools, giving you a more coherent view of the IT & OT environments in a single pane of glass.

Grid Image
Device Integrity

Take an active role in securing your industrial infrastructure devices.

Indegy Hybric Detection Passive Plus Active Diagram

Device Integrity

Central to our hybrid threat detection model, Indegy Device Integrity discovers, classifies and queries all ICS assets even when they aren't communicating in the network. Using patent-pending active detection technology, this add-on option works conjointly with network sniffing by collecting information that is impossible to find in the network - yet crucial to protecting the OT environment. Device Integrity technology safely queries devices using native commands and protocols, with zero impact on network operations.

CyberSecurity Suite_Blade

Right-Sizing Your Solution

Whether you seek a basic, 100% passive monitoring solution or our Preferred or Enterprise editions that include Device Integrity, Indegy offers choices to meet each organization's needs and budget.