SOLUTION BRIEF Cybersecurity & Compliance Automation for the Maritime Industry THE CHALLENGE Increasing Cyber Threats & Emerging Regulatory Requirements Increasing digitalization and connectivity in the maritime industry have exposed critical safety and operational systems to new cyber threats. To address these risks, many governing bodies like the International Maritime Organization (IMO) and United States Coast Guard (USCG) are creating and enforcing new guidelines that both ports and vessels must comply with. These factors are creating new challenges for companies in the maritime industry. INDUSTRIALDEFENDER.COM Industrial Defender Solution Brief THE SOLUTION? INDUSTRIAL DEFENDER With decades of experience providing cybersecurity and compliance solutions for industrial assets, we help teams in the maritime industry build a strong foundation to apply cybersecurity controls, automate their compliance efforts, and detect threats to operational systems in real time. Security teams can address these new cybersecurity and compliance challenges with the safe and effective data collection, monitoring, and management for operational systems provided by Industrial Defender. Easy integrations into the broader security and enterprise ecosystem also empower IT teams with the same visibility, access, and situational awareness that they’re accustomed to on corporate networks. KEY BENEFITS • Automatically identify and monitor all of your connected assets, including onboard systems on ships, buildings, cranes, switch yards, and physical access control systems • Detect and prevent cyberattacks against your maritime assets with realtime threat alerts • Automate compliance with emerging security standards from IMO, USCG, ABS, NIST, and others Features & Capabilities • Complete, centralized inventory of all digitally connected operational assets • Automated compliance policies and reporting templates for emerging regulations • Vulnerability monitoring to identify which assets are exposed to emerging threats to help prioritize patching efforts • Anomaly detection engine to quickly identify potential cyber threats and provide actionable information to reduce MTTR • Endpoint Risk Analytics Suite to quantify risk for threat vectors like security events, baseline deviations, vulnerabilities and health status • Scalability of the system enables monitoring of multiple vessels or sites within a port from a single screen Industrial Defender Use Cases Maritime Asset Management Knowing what devices you have in your system is the first step to securing it. Industrial Defender provides a single view into all your operational assets. The Endpoint Risk Analytics Suite also provides a detailed risk score and visualizations for each device with the ability to drill down into individual asset health. Cyber Threat Detection Our anomaly detection engine delivers an unprecedented level of visibility and actionable security data to provide the foundation for a sustainable security program. By collecting, normalizing, and analyzing the vast amount of information provided by your maritime systems in one place, you can easily keep track of the security events that really matter. 2 Industrial Defender Solution Brief Configuration Management Automatically collects, normalizes, and reports changes affecting your maritime systems, regardless of vendor or location. You can easily create asset baseline configurations that our change detection engine compares with actual configuration data including ports and services, users, software, and patches and firewall rules. Vulnerability Monitoring Our vulnerability monitoring combines the power of asset management with the accuracy and completeness of NIST’s vulnerability database. This feature reports a current list of the potential Common Vulnerabilities and Exposures (CVEs) associated with your device inventory and provides information on patches available for these vulnerabilities. Policy Management Provides you with an easy way to create, deploy, and audit compliance with built-in policies for your control systems environment. As a vendoragnostic solution, policies can be written and applied to multiple assets, saving time and effort. Compliance Reporting With a suite of built-in standard reporting packages, including reports for the NIST CSF, Industrial Defender eliminates the manual task of data collection and report generation. The reporting application lets you configure report subscriptions for non-privileged users and send them via email, server share, and SharePoint, to ensure the delivery of real-time information to those who need it the most. Workflow Automation This optional application suite integrates document management and reporting as part of a structured workflow. You can improve operational efficiency by initiating, tracking, approving, documenting, and reporting on changes made to control systems assets automatically and store all documents related to a change, like emails, test approvals, and configuration files, in one place. 3 Industrial Defender Solution Brief Industrial Defender Architecture THE INDUSTRIAL DEFENDER DIFFERENCE Since 2006, Industrial Defender has been solving the challenge of safely collecting, monitoring, and managing OT asset data at scale, while providing cross-functional teams with a unified view of security. Their specialized solution is tailored to complex industrial control system environments by engineers with decades of hands-on OT experience. Easy integrations into the broader security and enterprise ecosystem empower IT teams with the same visibility, access, and situational awareness that they’re accustomed to on corporate networks. They secure some of the largest critical control system deployments with vendors such as GE, Honeywell, ABB, Siemens, Schneider Electric, Yokogawa and others to protect the availability and safety of these systems, simplify standards and regulatory requirements, and unite OT and IT teams. SCHEDULE A DEMO FOR MORE INFORMATION 1 (877) 943-3363 • (617) 675-4206 • info@industrialdefender.com 225 Foxborough Blvd, Foxborough, MA 02035 industrialdefender.com © 2021 iDefender, LLC 4 Industrial Defender Solution Brief