Operational technology security company Industrial Defender, recently announced enhancements to their cybersecurity management platform. Their ASM product will now include automated risk scoring for OT assets, new assisted passive monitoring (APM) technology, and simplified executive-level NIST Cybersecurity Framework reporting.
“With this release, our customers can stay focused on strategic priorities and keep IT and OT teams aligned using these new automations and enterprise integrations with SIEMs and business intelligence tools,” Jim Crowley, CEO at Industrial Defender, said in a press release. “We’re also excited to bring our Endpoint Risk Analytics Suite to market, the only risk quantification tool of its kind. It uses a unique, asset-first approach with a completely transparent scoring methodology for ease of use.”
The enhanced cybersecurity management platform will feature a new Assisted Passive Monitoring (APM) engine designed to speed up the asset discovery process by using both packet capture data from protocols and automatically sending native commands that can discover more than 1,000 different OT devices, which may not be actively communicating over the network. That data can then be aggregated into an API-enabled Netflow application to let users drill into asset status and communications at a glance.
Customers will also now be able to automate executive-level reporting to demonstrate cyber risk reduction efforts and benchmark their progress towards NIST CSF maturity. Additionally, the product will offer new API-enabled integrations, customization capabilities and workflow automations for the disposition of retired or inactive assets.
Industrial Defender’s cybersecurity management platform also leverages asset-centric and network-centric methods, to quickly quantify cyber risk for threat vectors like security events, baseline deviations, vulnerabilities, and health status. Users can also visualize overall event trends to see how each asset got its risk score. This scoring transparency lets security teams choose which threat vectors to focus on.