Overview | ||||||
Supplier Slogan | Leader in Industrial Cyber Security - Protecting SCADA, ICS and OT Networks of Critical Infrastructure. | Securing the Industrial Internet | ||||
HQ Location | United States | United Kingdom | United States | United States | United States | United States |
Year Founded | 2014 | 2013 | 2007 | 1993 | 2013 | 1995 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | $10-100m | $10-100m | < $10m | < $10m |
Employees | 51 - 200 | 201 - 1,000 | 51 - 200 | 51 - 200 | < 10 | < 10 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Indegy, a leader in industrial cyber security, protects operations (OT) networks from cyber threats, malicious insiders and human error.
| Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps. | PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure. Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites. With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors. With PAS alarm management solutions, industrial companies have the Assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. |
IoT Solutions | The Indegy Industrial Cybersecurity Suite arms security and operations teams with full visibility, security, and control of ICS activity and threats. Unparalleled, patented hybrid technologies combine policy-based monitoring and network Anomaly Detection with unique device integrity checks. Indegy solutions are installed in automotive, pharmaceutical, energy, water, electric and other industrial organizations worldwide. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | As a platform, the CloudLock Cloud Security Fabric takes a programmatic approach to cloud security. In addition to leveraging APIs from cloud services, CloudLock is itself a collection of RESTful, API-based Microservices. Using this approach, CloudLock dynamically applies individual security services (such as Cloud DLP) to customer apps on any platform, whether those apps are running on a well-known services such as Amazon Web Services (AWS) or an On-Premises server. | ICS Cybersecurity
Secure ICS assets by leveraging industry leading inventory and Configuration Management technology.
- Cyber Integrity
- Inventory Management
- Vulnerability Management
- Configuration Management
- Risk Analytics
- Compliance Management
- Backup & Recovery
Automation Asset Management
Simplify Configuration Management across all automation assets to ensure operational reliability.
- Automation Integrity
- Project Integrity
- DOC4000
Operations Management
Transform process safety and profitability by gaining real-time insights into operational risk.
- Alarm Management
- IPL Assurance
- High Performance HMI
- inBound
- ControlWizard
- TuneWizard | ||
Key Customers | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | NASA, HBO, Dreamworks Studio, Sunnova, Whirlpool, Acquia | ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & PrivacyAnalytics & ModelingInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Renewable Energy | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | |||
Use Cases | CybersecurityProcess Control & Optimization | Water Utility Management | ||||
Functions | Logistics & Transportation | |||||
Services | Cybersecurity Services | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | Minor | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | None |
Application Infrastructure & Middleware | None | Minor | None | None | None | None |
Analytics & Modeling | None | None | None | Minor | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | IBMAruba Networks | Amazon Web ServicesGoogleIBMMicrosoftZscalerVMware (DELL)RSA (DELL) |
Overview | ||||||
Supplier Slogan | Leader in Industrial Cyber Security - Protecting SCADA, ICS and OT Networks of Critical Infrastructure. | Securing the Industrial Internet | ||||
HQ Location | United States | United Kingdom | United States | United States | United States | United States |
Year Founded | 2014 | 2013 | 2007 | 1993 | 2013 | 1995 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | $10-100m | $10-100m | < $10m | < $10m |
Employees | 51 - 200 | 201 - 1,000 | 51 - 200 | 51 - 200 | < 10 | < 10 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Indegy, a leader in industrial cyber security, protects operations (OT) networks from cyber threats, malicious insiders and human error.
| Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps. | PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure. Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites. With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors. With PAS alarm management solutions, industrial companies have the Assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. |
IoT Solutions | The Indegy Industrial Cybersecurity Suite arms security and operations teams with full visibility, security, and control of ICS activity and threats. Unparalleled, patented hybrid technologies combine policy-based monitoring and network Anomaly Detection with unique device integrity checks. Indegy solutions are installed in automotive, pharmaceutical, energy, water, electric and other industrial organizations worldwide. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | As a platform, the CloudLock Cloud Security Fabric takes a programmatic approach to cloud security. In addition to leveraging APIs from cloud services, CloudLock is itself a collection of RESTful, API-based Microservices. Using this approach, CloudLock dynamically applies individual security services (such as Cloud DLP) to customer apps on any platform, whether those apps are running on a well-known services such as Amazon Web Services (AWS) or an On-Premises server. | ICS Cybersecurity
Secure ICS assets by leveraging industry leading inventory and Configuration Management technology.
- Cyber Integrity
- Inventory Management
- Vulnerability Management
- Configuration Management
- Risk Analytics
- Compliance Management
- Backup & Recovery
Automation Asset Management
Simplify Configuration Management across all automation assets to ensure operational reliability.
- Automation Integrity
- Project Integrity
- DOC4000
Operations Management
Transform process safety and profitability by gaining real-time insights into operational risk.
- Alarm Management
- IPL Assurance
- High Performance HMI
- inBound
- ControlWizard
- TuneWizard | ||
Key Customers | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | NASA, HBO, Dreamworks Studio, Sunnova, Whirlpool, Acquia | ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & PrivacyAnalytics & ModelingInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Renewable Energy | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | |||
Use Cases | CybersecurityProcess Control & Optimization | Water Utility Management | ||||
Functions | Logistics & Transportation | |||||
Services | Cybersecurity Services | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | Minor | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | None |
Application Infrastructure & Middleware | None | Minor | None | None | None | None |
Analytics & Modeling | None | None | None | Minor | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | IBMAruba Networks | Amazon Web ServicesGoogleIBMMicrosoftZscalerVMware (DELL)RSA (DELL) |