Your one-stop web resource providing safety and security information to manufacturers

Operational technology (OT) network monitoring provider, Indegy, will integrate its Industrial Cybersecurity Suite with IBM’s QRadar Security Intelligence Platform, in a move to connect visibility between enterprise information technology (IT) environments and industrial, OT environments.

Attacks in the OT space have shown today’s Industrial Control Systems (ICS), many of which are now connected to enterprise IT systems, are no longer isolated from cyber threats.

RELATED STORIES
CyberX Earns Patent for ICS Risk Analytics
Radware Deals for Bot Mitigation Firm
Schneider, Transpara In Real-Time Monitoring Pact
CyberX, GE Ink Partnership Pact

Meanwhile, traditional IT security solutions are unable to monitor the specialized systems used in OT environments to identify risks. Combining Indegy’s Industrial Cybersecurity Suite and IBM QRadar can provide a deeper level of visbility across both realms of a manufacturer’s enterprise.

The Indegy Industrial Cybersecurity Suite which parses OT events it gathers and converts them to a standard taxonomy format that can be displayed through the QRadar interface is available now on IBM Security App Exchange.

Cyber Security

“IBM QRadar is trusted by thousands of enterprises to monitor cyber security threats in their IT environments,” said Barak Perelman, co-founder and chief executive of Indegy. “By combining our unmatched visibility into both industrial network and device level activity, with IBM QRadar, we are providing customers with holistic protection that spans their IT/OT infrastructures and can detect threats that attempt to move laterally between them.”

The Indegy Industrial Cybersecurity Suite provides real-time situational awareness and visibility into ICS networks. It combines behavioral anomaly detection with policy based rules for comprehensive threat detection and mitigation, and visibility into the asset inventory.

The IBM QRadar Security Intelligence Platform integrates security information and event management (SIEM), log management, anomaly detection, network analysis, user behavior analytics and vulnerability management to analyze data in real-time across an organization’s enterprise IT infrastructure to detect and prioritize potential security threats.

Pin It on Pinterest

Share This