Resource Center

PUD Whatcom Case Study screenshot
Case study
Video – PUD #1 Of Whatcom County

Indegy helps PUD #1 of Whatcom County guarantee protection to its public utilities from remote and local attacks.

Nesher Case Study Screenshot
Case study
Video – Nesher Protects Its SCADA Network

Indegy helps the leading cement manufacturer protect its very complex SCADA environment

  • resource type
  • topic
Webinar
Cracking The Code on OT Security

Watch this webinar to learn what “active” security is, what it does, why you need it, how it is safe and how to get there.

PUD Whatcom Case Study screenshot
Case study
Video – PUD #1 Of Whatcom County

Indegy helps PUD #1 of Whatcom County guarantee protection to its public utilities from remote and local attacks.

Report
451 Research – Report on Indegy

Learn 451's take on the additions Indegy made to its product portfolio

Nesher Case Study Screenshot
Case study
Video – Nesher Protects Its SCADA Network

Indegy helps the leading cement manufacturer protect its very complex SCADA environment

City of Raleigh Case Study screenshot
Case study
Video – City of Raleigh Keeps Water Supply Safe

Indegy helps City of Raleigh maintain safety and availability of water and other public utilities

Use case
Oil & Gas Downstream Sector

Learn how to protect against unauthorized changes and ensure continuous operations

Report
The 2018 SANS Industrial IoT Security Survey

Learn which industrial guidelines are most commonly followed by security experts

CyberAware Video for Transportation and Logistics small
Tutorial Video
Cyber Aware for Transportation & Logistics

Barak Perelman, discusses the implications of a cyber attack on transportation and logistics.

Threats to Industrial Control Systems Video screenshot
Tutorial Video
Threats to Industrial Control Systems

Protecting ICS against external cyber attacks is not enough, since threats also exist inside the network.

Guide
ICS Cyber Security Checklist

Here are the 6 areas of criteria to evaluate before choosing an ICS cyber security solution

CyberAware Video for Manufacturing small
Tutorial Video
Cyber Aware for Manufacturing

Barak Perelman, discusses the implications of a cyber attack on manufacturing facilities.

Infographic
7 Most Unsafe Gaps for Industrial Cyber Security

The convergence of IT and OT has led to new threats that affect the ICS networks.

White paper
Are You Minding The IT/OT Gap?

Learn how Indegy helps security teams find a way to monitor and identify threats to their industrial control systems

Brochure
Indegy Device Integrity

Discover the most advanced active detective solution for ICS environments

CyberAware Video for the Building Automation (BMS)
Tutorial Video
Cyber Aware for Building Automation (BMS)

Barak Perelman, discusses the implications of a cyber attack on building management systems.

Webinar
Unveiling Security Gaps in ICS Networks

View recorded webinar – Originally played on June 28th 2016

Webinar
The State of Industrial IoT

Watch our webinar to learn how industrial systems can be safeguarded and secured even as part of the industrial IoT.

Webinar
How a new PLC Simulator vulnerability can compromise SCADA/ICS networks?

Webinar
Gaining Visibility and Boosting ICS Security

Learn about threats to ICS networks and the need for visibility in securing these environments.

Webinar
Conquering the ICS Insider Threat

Learn about 3 most common forms of insider security threats to industrial control systems.

Webinar
Bridging The Gap – IT/OT Alignment

To protect ICS networks, it’s vital to know the difference between IT and OT and how they can work together.

Why to protect indsutrial controllers video screenshot
Tutorial Video
Why Protect Industrial Controllers?

Industrial controllers are critical to the safety of physical processes, but lack security controls.

Introduction to Industrial Cybersecurity video screenshot
Tutorial Video
Introduction to Indegy Industrial Cyber Security

Watch this short video to learn more about Indegy Industrial Cyber Security

Mille on BFM Business video screenshot
Interviews
Indegy CTO Mille Gandelsman on BFM Business

Indegy CTO Mille Gandelsman discusses Israel’s tech sector

The Importance Of Industrial Control Plane screenshot
Tutorial Video
Importance of the Industrial Control Plane

Without monitoring control-plane protocols, malicious and erroneous changes to ICS are easy to miss

Device Integrity on both fronts video screenshot
Tutorial Video
Hybrid Security on Both Fronts

Learn how Indegy’s Device Integrity provides proactive security on both fronts for industrial environments.

Barak Perelman on Vice HBO Video Screenshot
Interviews
Barak Perelman Interview- Vice News

Indegy CEO Barak Perelman demonstrates the potential damage hackers cause to industrial networks.

Mille on BFM Business video screenshot
Interviews
Indegy CTO Mille Gandelsman on BFM Business

Indegy CTO Mille Gandelsman discusses Israel’s tech sector (French)

Use case
Pharma Manufacturing

Discover how to validate and protect drug manufacturing processes

Use case
Automotive Manufacturing

Read how a global automaker reduced operational disruptions in manufacturing

Solution brief
Indegy Risk Assessment Service

Learn how Indegy’s new risk assessment service can help you protect your industrial network and mitigate threats

Solution brief
Indegy Interactive Asset Map

Find out how Indegy visualizes ICS network assets and the connections between them

Report
Frost & Sullivan Product Award

2017 North American Industrial Cyber Security for Pharmaceutical Manufacturing Product Leadership Award

Infographic
Industrial Controllers No Longer Safe from Malware

This infographic shows the 6 stages of a malware attack on industrial controllers.

Infographic
[Japanese] Industrial Controllers No Longer Safe from Malware

Stages of a malware attack on industrial controllers

Guide
Top 3 Reasons Why Automotive Manufacturers Experience Operational Downtime

Guide
NIS Framework Compliance

Learn about ICS compliance with the NIS Cyber Security Framework

Guide
Compliance Guide for NERC CIP Standards

Learn how Indegy enables electric utilities to comply with NERC CIP standards framework

Datasheet
SIEM Advanced ICS Threat Detection

Indegy and RSA NetWitness Platform together help identify and protect against sophisticated attacks

Datasheet
Indegy with Suricata Enhancement

Using Suricata, find out how Indegy inspects each and every packet in your network

Brochure
Indegy Industrial Cybersecurity Suite

Learn more about Indegy’s Cyber Security Suite for ICS networks

Brochure
Indegy Company Overview

Indegy is an Industrial Cyber Security company that delivers visibility and control to ICS networks

CyberAware Video for the Power Industry thumbnail
Tutorial Video
Cyber Aware for Power Plants

Barak Perelman, discusses the implications of a cyber attack on power plants.

White paper
5 Things to Know About The Industrial Control-Plane

What is the industrial control-plane and why is it important?

Automated Asset Discovery Video Screenshot
Tutorial Video
The Need for Automated Asset Discovery

Learn how Indegy automates asset discovery and reduces labor costs

Solution brief
Palo Alto and Indegy Joint Solution

Palo Alto and Indegy have partnered to provide a seamless offering to increase visibility into ICS

Infographic
ICS Incidents in the News

Check out the high profile ICS incidents that have grabbed headlines in the last few years.

White paper
3 Use Cases for OT Asset Management

Discover the top 3 use cases for automated OT asset discovery and management

ARC Industry Forum 2016
Interviews
Indegy’s CEO – ARC Industry Forum 2016

ARC’s Sid Snitkin interviews Indegy’s CEO Barak Perelman about ICS cyber security

Webinar
The Industrial Control-Plane

5 Things You Should Know About The Industrial Control-Plane

Webinar
Passive, Active or Hybrid Monitoring

Watch our webinar to get answers about the advantages and disadvantages of different monitoring solutions

Guide
NIST Cybersecurity Framework

Indegy’s Platform supports the implementation of the NIST cybersecurity framework

Webinar
Protecting Operational Assets

Learn the importance of visibility on your asset inventory to allow behavioral anomaly detection.

Webinar
The Hype of Critical Infrastructure Protection

Explore the cyber threats to critical infrastructure security and how hackers exploit vulnerabilities

Webinar
The 5 Most Common Security Breaches

Learn about the top 5 OT security breaches and how you can protect your industrial environment against them.

Webinar
Industrial Cyber Security 101

Watch our webinar to learn about the steps you can take to ensure your operation remains secure and reliable.

Webinar
ICS Cyber Security in The Real-World

Demonstrating Threat Detection and Mitigation In Industrial Networks

Load More