Detect industrial attacks with Indegy signature-based threat detection engine
Relevant Industrial Control system (ICS) signatures are developed to find known attacks that can impact Industrial Cyber Security environments. Our signature detection engine works in concert with our policy and anomaly-based detection to identify both known and unknown attacks.
Leveraging all three technologies working together ensures that you see more, catch more and can stop attacks before they negatively impact your mission and goals.
Deep Packet Inspection
Leveraging advanced detection methodologies, Indegy matches signatures from its extensive database down to the packet level rather than using packet filtering which can miss certain types of known attacks.
Community Based Collaboration
Indegy is a member of the OISF and leverages the strength of the greater security community by incorporating Suricata as an additional contributor to its signature based detection capabilities.
Action Based Alerting
Indegy sends actionable alerts based on your requirements. Different severities or types of alerts may be routed to different personnel and may arrive based on their preconfigured channel of choice.
Industrial Grade Security
A confluence of factors has put OT networks online and more susceptible to cyber attacks. Without the appropriate rulesets, ICS security can be hard to attain. Watch this webinar to learn about the best practices for creating rulesets that truly defend your business.Watch Webinar
Leverage the power of the greater security community
The Indegy Signature Based Threat Detection Engine, leverages our close partnership with OISF. Utilizing the Suricata set of signatures along with Indegy proprietary signature rules you’ll have access to the widest possible detection engine available for ICS networks. The engine detects attacks throughout all stages and alerts with context on suspicious traffic that can indicate reconnaissance, exploits, installed malwares, lateral propagation and more. The engine is constantly updated to detect the ever-evolving threats in the ICS landscape.
Widest Range of Threats
Detecting threats starting from the initial reconnaissance stage to, scans, exploits, lateral movement, malware weaponization and attacks.
Updated Signature Database
Keeping up with all the threats to provide the best detection possible to the newest and most sophisticated ongoing attacks.
Mitigation and Prevention
Contextual alerts, combined with mitigation steps help users mitigate and prevent undergoing attacks and potentially vulnerable configuration.
Amplify Your Threat Hunting
Thousands of signatures to detect the widest range of attacks.
Define Your Ruleset
Create rulesets that best fit your unique network needs and threats.
Detect The Newest Threats
Keep updated to constantly detect new threats.
Our consortium members are critical to Suricata’s ongoing success and development. With support from companies like Indegy, our team can keep Suricata ahead of the growing demands for stable and robust security technologies.
Kelley Misata, Ph.D., Executive Director of the Open Information Security Foundation (OISF).