Cyber Security / Security

New Indegy Service Provides Visibility Into ICS Risk

By Chemical Processing Staff

May 02, 2018

Indegy launches a risk assessment service that reportedly enables organizations to quickly and affordably assess security risk exposures in their operational technology (OT) environments right down to individual controller configurations. The service provides a comprehensive view that identifies risks, maps them to their origin and scores the severity to provide a blueprint for remediation. The Indegy Risk Assessment Service takes into account cyber threats, malicious insider security alerts, known vulnerabilities and specific control device configurations that may expose them to potentially malicious threats.         

Following the recent United States Computer Emergency Readiness Team (US-CERT) technical alert which revealed that attacks were already underway against critical infrastructure sectors, many industrial organizations are re-evaluating their security risk management practices, according to Indegy. The Indegy Risk Assessment Service enables executives, managers, security analysts and automation engineers to immediately understand the specific vulnerabilities and security gaps in their environments.

“Most industrial organizations are now realizing that their OT environment is at risk more than ever before and they need to implement new security controls. Their biggest challenge is knowing where to start,” says Mille Gandelsman, CTO of Indegy. “Our Risk Assessment Service provides facilities operators with clear and documented visibility into all the risks, vulnerabilities and exposures in their OT networks. It delivers an actionable blueprint for closing security gaps that can and have taken down mission critical operations.”

Indegy combines advanced network traffic monitoring and analysis with device integrity assessment capabilities to generate a complete and detailed security risk assessment report available for industrial networks, according to the company. The service builds a risk profile for each asset using a wide range of signals and details that span: inventory and assets, controller activity, traffic activity, network access and control, published vulnerabilities and open ports. 

For more information, visit: