The Indegy Risk Assessment Service offers clear analysis and insights about your organization's cyber security posture and highlights potential vulnerabilities or threats that require attention.

Using Indegy’s advanced network monitoring and device integrity technologies, our security risk assessment provides an in-depth analysis of your industrial environment, network behavior, asset inventory, alerts, configurations and risk posture.

The results of Indegy's risk assessment are delivered in a comprehensive report, which provides a fully detailed view of the ICS network and assets. This service enables you to gain a deep understanding of the risk factors in your network, so you can prioritize and operationalize mitigation steps and proactively address potential threats.

Automated Asset Inventory

Fully automated asset inventory with comprehensive details for each asset enables continuous and accurate change management and auditing processes.

Network Traffic Analysis

By creating network behavior baselines, Indegy detects anomalies such as new connections, changes in network traffic patterns, and suspicious network traffic and events.

Risk Score Summary

GUI-based summary of risk components lets you drill down into high-risk areas and provides easy-to-use tools for creating effective mitigation actions.

Stats Pattern
56%

Have little or no visibility of risks

Most critical infrastructure executives say they have limited visibility into the current state of security within their environment. - Indegy survey 2018

Indegy Risk Assement Report Executive Summary

What's Your Cyber Security Posture?

Indegy’s Risk Assessment Service enables sound and reliable security risk management, taking into account all types of alerts, vulnerabilities and vulnerable configurations in the environment. The service provides security analysts, managers and automation engineers with vital security information related to their industrial networks and asset inventories.

Understand ICS Network Security Risks

Grid Image
Automatic Asset Tracking

Understand the full context of security events based on automatic asset tracking, discovery and classification.

Indegy Risk Assement Repor of asset Drill Down

Automatic Asset Tracking

Indegy creates an inventory of all network devices and understands the relationships and connections between them. Automatic asset tracking provides the full context for security events and supports routine procedures for improving cyber hygiene. Leveraging its dual threat detection and unique Device Integrity capabilities, Indegy builds a risk profile for each asset based on its configuration and other related events. Indegy supports a risk-based cyber hygiene approach by prioritizing risks and suggesting steps to address them.

Grid Image
Pinpoint Vulnerabilities

Proactively address undetected vulnerabilities in ICS assets before they are exploited.

Indegy Risk Assement Report of Most Severe Vulnerabilities

Pinpoint Vulnerabilities

Vulnerabilities are factored into Indegy’s Risk Assessment logic. Indegy recognizes vulnerabilities to industrial network controllers, based on known vulnerabilities in the CVE list that can be potentially exploited by malicious actors to harm industrial networks. Based on Indegy's knowledge of each controller's model, OS and firmware version, it pinpoints vulnerabilities in the network, issues alerts and provides critical insights for the required mitigation steps. This minimizes risk and reduces threats to the network.

Grid Image
Monitor Controller Activity

Identify and analyze controller activities as part of your configuration management and threat detection procedures.

Indegy Risk Assement Report of Controllers Code Revision

Monitor Controller Activity

Indegy tracks code, OS & firmware changes executed on controllers, whether performed through the network or locally. Revision tracking and visibility into every code change ensures in-depth protection of your industrial processes. This full controller activity analysis also includes a list of active engineering stations, which can be used to monitor permissions and detect anomalies in controller access.

Grid Image
Network Traffic Analysis

Get early warning of potential threats by detecting anomalies in network traffic behavior.

Indegy Risk Assement Report of Traffic Overview

Network Traffic Analysis

Indegy passively monitors network traffic, looking for unexpected changes in the top sources and destinations, as well as analyzing volumes of network traffic and used protocols. Anomaly detection can result in early warning of malicious behavior or network configuration changes that need to be investigated and addressed.

Grid Image
Detailed Risk Assessment

Mapping risk for the entire network lets you build an efficient risk mitigation plan.

Indegy Risk Assement Report of Risk Overview

Detailed Risk Assessment

In addition to mapping risk score for every asset and highlighting vulnerable assets, Indegy helps users detect the origins of risk in their environments through in-depth analyses of every risk factor. Indegy’s security risk assessment considers alerts in the environment, existing known vulnerabilities and specific aspects in the configuration of controllers that may expose them to potentially malicious threats.

Risk Assessment Report

Security Risk Assessment Report

The Indegy Risk Assessment report provides a baseline for mapping the security risks in the network and building a risk mitigation plan. The report covers all aspects of risk assessment and delivers full visibility into the industrial network and assets.