Welcome to NexDefense

NexDefense' mission is to provide unprecedented visibility and network intelligence for the protection of critical industrial control systems and assets to enhance the reliability, resilience and safety of the services they provide and to make accessing these systems more secure.

  • Discover

    Passively detect and identify all connected devices and communication channels in your OT systems without disrupting critical operations.

  • Visualize

    Visualize control system network activity and device-to-device communications in real-time to assess network health, detect unusual activities and verify configuration changes and updates.

  • Baseline

    Build and manage a baseline of known devices, communication patterns and network events to identify abnormal conditions that may damage or disrupt operations.

  • Detect

    Locate and evaluate abnormal, potentially disruptive network events and inform responders while triggering other active protections within the control system.


img

Improved Security & Uptime

Enhanced Operational Integrity

Process and Time Management

Reduced Risks and Costs

About NexDefense

At the core of the NexDefense value proposition is a promise to provide unprecedented visibility that helps to mitigate risks and further ensure safety, security and operational integrity to ICS network environments. By executing on this promise, NexDefense makes these environments more valuable to their enterprises and enables, for the first time, a view and situational awareness about network risks reaching converged Information Technology (IT) and Operational Technology (OT) systems as new connections are made and as the Industrial Internet of Things (IIoT) continues to expand into critical automation and control systems.

NexDefense is led by some of the world's most trusted cybersecurity experts for automation and control systems. We empower automation and control system operators in critical infrastructure and defense facilities with the real-time knowledge needed to always maintain system integrity and combat sophisticated cyber threats - wherever and whenever they occur.

NexDefense empowers industrial control system operators with the real-time knowledge needed to maintain system integrity and combat sophisticated cybersecurity threats. Through Sophia, a patent-pending Industrial Network Anomaly Detection (INAD) system, engineers, security, and control system operators can covertly maintain direct insight and control over threats and increase compliance without sacrificing productivity, optimization or performance. Originally funded by the United States Department of Energy and developed at the Idaho National Laboratory (INL) under the management of the Battelle Energy Alliance, Sophia's proven capacity to continuously identify, analyze and warn about deviations from normal operations limits risk, reduces liabilities and ensures the integrity of critical industrial automation and control systems.

  • client logo
  • client logo
  • client logo
  • client logo
  • client logo
  • client logo
img

Evaluate the World's Most Advanced ICS Solution...

REQUEST DEMO ...

Leadership

The NexDefense founders, management team, and board of directors have helped shape the OT and IT intelligence and security market for decades and have been responsible for some of the most important network security advancements in the industry including ICS Command-Level Parsing (CPL), Industrial Event Recorders, and OT/ICS intrusion prevention. This team has a proven track record of delivering value to customers, employees and shareholders.

  • 20+ years of executive leadership and business growth

    Jeff Spence

    CEO
  • 20+ years of industry leading network and cybersecurity platform development

    Loney Crist

    VP Engineering
  • 20+ years of operational network and cybersecurity sales leadership experience

    Preston Futrell

    VP Sales
  • Accomplished financial executive delivering success to emerging growth companies.

    Graham Wood

    CFO

Board of Directors

The NexDefense Board of Directors is comprised of some of the industry's most accomplished executives, operators, investors and advisors. Their collective experience includes decades of experience in Cybersecurity, networks, software, media and telecommications and includes hundreds of corporate mergers, sales and purchases.

  • client logo
  • client logo
  • client logo

NexDefense Sophia™

Sophia, the Greek word for Wisdom, is a patent-pending Industrial Network Anomaly Detection (INAD) system incorporating technology that resulted from extensive collaboration between the United States Department of Energy, Battelle Energy Alliance and the cybersecurity experts of Idaho National Laboratory (INL). The NexDefense Sophia solution provides unparalleled visibility, network event monitoring and notification services that help ensure greater safety, security and operational integrity for today's highly-engineered controls systems used across industry.


img

Enhanced Security & Improved Uptime

Protecting control systems from disruption and damage requires continuous monitoring and a deep level of intelligence about the health and status of the overall systems. Gaining insight to industrial networks using network monitoring enables better decisions and streamlined action-plans that can help to protect systems from unintentional and malicious harm.

  • Visibility to network events
  • Zero-touch monitor/intrusion detection
  • Early warnings of unusual events
  • Network & device real-time details
  • Direct notifications to key parties

img

Enhanced Operational Integrity

Control systems are engineered to operate reliably by controlling variables that can affect safety, quality and productivity. Over time, changes to device and system configurations lead to unintended risks. Monitoring, visualizing and alerting on unusual network events helps ensure operational integrity and ongoing adherence to policies, standards and best-practices.

  • Continuous comparison of system operations against known-good state
  • Verify and validate infrastructure configuration and failure-modes
  • Increase confidence of system availability

img

Time Savings & Process Improvement

When key information is available at your fingertips, better and faster decisions can be made that help offset risks and help assure safety and productivity of control system operations. Risks of downtime, disruption and even damage can be mitigated when intelligent decisions are supported with real-time.

  • Visualize abstract events in real-time
  • Streamline troubleshooting workflows
  • Compare new events with known-good
  • Log data for analysis and forensics

img

Cost Reduction & Risk Mitigation

When making risk-based decisions, workflow-models and processes can quickly change as new information becomes available. Access to timely, relevant information about a system and interconnected devices is essential to ensuring the overall security posture of the system.

  • Zero-touch network & device monitoring
  • Lower maintenance costs & complexity
  • Accelerate remediation activities
  • Reduce change management costs
  • Reduce assortment of secondary tools

NexDefense Value Proposition

At the core of the NexDefense value proposition is a promise to provide unprecedented visibility and intelligence about network-based events that can affect the safety, quality, productivity and profitability of industrial control systems. The NexDefense solution heightens awareness, supports critical risk-based decisions, streamlines workflows and response & recovery plans necessary to protect systems throughout their lifecycle.

  • Device Discovery and Monitoring

    Find it. From the first steps of a device connecting to a network, to the health and status of the connections between devices and systems, it's all seen, tracked and monitored for changes. The NexDefense solution is engineered to identify all devices and track all interactions in the network.





  • Event Tracking and Alerting

    See it. Uniquely track and display network activities in its 3D view, operator's dashboard, asset & event logs and output key information to other security controls to support deeper analysis. Operators, system technicians, control system engineers and network specialists can all make use of these real-time views of events to set priority and take steps to protect the system from harm.

  • Network Optimization

    Measure and refine it. Anytime devices or connections are added or removed, configuration changes made or patches applied to control systems the risk posture of the systems change. Gaining insight to what's connected, where data is flowing how traffic patterns change over time helps to isolate problems that can slow a system or affect its safety, security and integrity.

  • Security Posture Improvement

    Protect it. Managing risk is essential to the successful operation of critical systems. Identifying potential weaknesses such as unused services and unusual connections allows for proactive steps to be taken to remove risk, bolster security and ensure compliance to policies, standards and best practices.



img
10

Industries Served

109

Mgmt Years in Security

224,546

Devices Monitored

NexDefense Industries

Highly engineered control systems used in critical infrastructure and manufacturing span all industries and applications. NexDefense is positioned to address not only specific needs of a particular industry sector, but to also help protect systems that intersect and overlap.

img

Power

img-1

Power

The critical infrastructure of power and utility companies are increasingly susceptible to aggressive cyber attacks. But unlike in years past, modern threats aren't just the result of technical vulnerabilities, they are the consequence of customized, micro-targeted and lengthy intrusions that seek maximum disruption over time. Enterprises across the power industry spectrum from coal and solar to hydro, wind, and nuclear all have risks tied to the operation of their automation and control systems. A successful interruption to a power company's infrastructure can devastate electricity generators and transmission distribution systems for hours or even days, triggering robust power outages, crippling blackouts and irreversible damage to a global economy that depends on unhindered access to power.

Request a Demo
img

Oil and Gas

img-2

Oil and Gas

Oil & Gas systems, whether upstream, midstream or downstream each experience unique cybersecurity risks due what's required for each to successfully deliver its product and services. If safety or security is compromised, unsafe conditions can quickly result as well as environmental hazards, regulatory implications, brand impacts and a host of other economic and supply chain challenges. Assets are often spread out over wide areas and the challenge of physical protection of these systems are compounded by networks connectivity that make use of vast arrays of different technologies from different eras. The effects of a cyber incident or attack can have significant consequences on the company, its stakeholders, the community, the environment and even the global economy. Determining what's connected in the hundreds and thousands of systems is a daunting task, but detecting and protecting against current and future threats makes network intelligence and monitoring an effective means to identify and reduce risks.

Request a Demo
img

Defense

img-2

Defense

The automation and control systems of defense facilities and command centers are some of the most frequent targets of sophisticated cyber threats with the power to intercept confidential communications and interfere with mission controls. Successful attacks waged by cyber threats to connected systems can allow adversaries to disrupt, damage or cause destruction of capabilities required for the mission and maintain a military advantage. Defense of citizens and nations depend on control systems that are mission-critical and require constant, unwavering vigilance to ensure they are available and ready to perform under all conditions. The US Department of Defense (DOD) alone is responsible for an estimated 2.5 million unique control systems spread across no less than 300,000 buildings. Many of these systems are employed to run operations and ensure physical system integrity for Building Automation, Energy Management, Power Generation, Transmission and Distribution, Water as well as variety of other support systems. Success in the mission relies on assurance of security and safety and hinges on 24x7x365 availability, integrity and reliability. Visibility and situational intelligence into the networks of these critical control systems helps to verify operation, locate weaknesses, determine unusual or unauthorized activities and establish action plans to protect, respond and recover should a cyber attack occur.

Request a Demo
img

Manufacturing

img-2

Manufacturing

The Manufacturing sector faces unique challenges in securing operations and ensuring safety in the product process and most typically the products and services it delivers. Heavy and expensive machinery, unique manufacturing processes with intellectual property that spans the product recipe, production process and data relating to quality, quantity, capacity to name only a few. Adding to this the multi-vendor nature of specialized machinery and a complex, yet interconnected supply chain of goods, services and support and the risks to disruption or damage from a cyber incident can have dramatic effects on health and well being of customers and corporate liability and reputation. With the vast number of control systems required to interact and coordinate to successfully produce products, connectivity of devices and systems continues to increase. When control system networks can be monitored, connectivity issues can be more quickly isolated, complex configurations can be validated and data flows can be visualized, all to help reduce cyber risks and help ensure ongoing efficiency and productivity.

Request a Demo
img

Transportation

img-5

Transportation

Transportation systems move freight and they move people. The complexity of systems cannot be underestimated, and the interactions and coordination amongst countless systems is essential to safe, efficient and timely operation. One compromised system can have a cascading effect on other systems in order to protect lives and prevent damage to capital intensive equipment. Since many systems are geographically separated, visibility into the operational aspects of these systems is crucial. The networks that enable communication for safety, control and telemetry all benefit from monitoring since unusual or unauthorized activities need quick action given lives are often at stake.

Request a Demo
img

Distribution

img-2

Distribution

The Distribution sector, like the manufacturing sector, faces unique challenges in securing operations and ensuring safety in the product process and most typically the products and services it delivers. Heavy and expensive machinery, unique manufacturing processes with intellectual property that spans the product recipe, production process and data relating to quality, quantity, capacity to name only a few. Adding to this the multi-vendor nature of specialized machinery and a complex, yet interconnected supply chain of goods, services and support and the risks to disruption or damage from a cyber incident can have dramatic effects on health and well being of customers and corporate liability and reputation. With the vast number of control systems required to interact and coordinate to successfully produce products, connectivity of devices and systems continues to increase. When control system networks can be monitored, connectivity issues can be more quickly isolated, complex configurations can be validated and data flows can be visualized, all to help reduce cyber risks and help ensure ongoing efficiency and productivity.

Request a Demo
img

Commercial/Government Facilities

img-2

Commercial/Government Facilities

Commercial & Government facilities include public and private buildings that support business activities, recreational activities, commercial transactions, and many government related activities to ensure government administrative operations. General-use office buildings, military installations, courthouses, national laboratories, embassies and other structures housing critical equipment, systems and interconnected networks. Many cyber elements interact, sometimes sharing common network infrastructures. Regardless, all of the systems require and benefit from constant monitoring. Fire and safety monitoring systems, lighting and signage, heating and ventilation systems, elevators and escalators, ATMs, POS systems and a variety of other smaller systems for safety and services become business critical as soon as they are disrupted or altogether lost. Gaining visibility to the networks that link devices and these control subsystems together is essential to ensuring integrity and availability to avoid disruptions that lead to personal and business risks.

Request a Demo
img

Critical Infrastructure

img-2

Critical Infrastructure

Dams are crucial for water retention and control services and span municipal and industrial water supplies, hydroelectric power generation, irrigation and agricultural applications, flood control, waterways for inland shipping, waste management, sediment control and recreation. Controlling water flow, monitoring key aspects of the dam operation, generating and delivering power for the grid are all critical to the operation of dams. Industrial control systems and widely dispersed control and monitoring stations interconnect over private and public infrastructure and are susceptible to cyber attacks much the same as other critical infrastructure sectors. Visibility into the network communication that drives these systems can help enhance protection and reduce risks to these critical assets.

Request a Demo
img

Food and Agriculture

img-2

Food and Agriculture

The Food and Agriculture sector faces unique challenges in securing operations and ensuring safety throughout production Intellectual property spans the product recipe, production process and data areas and directly relates to quality, quantity. Adding to this the multi-vendor nature of specialized machinery and a complex, yet interconnected supply chain of goods, services and support and the risks to disruption or damage from an operational or cyber incident can have dramatic effects on health and well being of customers and corporate liability and reputation. With the vast number of control systems required to interact and coordinate to successfully produce products, connectivity of devices and systems continues to increase. When control system networks can be monitored, connectivity issues can be more quickly isolated, complex configurations can be validated and data flows can be visualized, all to help reduce cyber risks and help ensure ongoing efficiency, productivity and safety.

Request a Demo
img

Chemical

img-2

Chemical

The Chemical sector can be divided into segments that include basic, specialty, agricultural, pharmaceutical and consumer products. Each are distinct and face a wide array of cybersecurity challenges ranging from disruptions to the supply chain to substantially hazardous impacts or disasters on a massive scale should a safety or security be compromised. Within these segments, the range of industrial control systems spans process, batch, discrete manufacturing and even SCADA for some of the largest facilities. Network connectivity is essential to control operations and monitor processes and the complexity of the systems can lead to challenges maintaining safety and reliability as systems as they expand and contract in size, as devices and configurations change, and as regulatory pressures require investments to mitigate risk and counteract threats. Locating and tracking devices, monitoring network health of thee complex systems and looking for abnormal, unusual activities that may be a leading indicator for a larger problem is essential to these hyper-connected systems.

Request a Demo
img

Telecommunications

img-2

Telecommunications

The telecommunications infrastructure is crucial for the ongoing operation of consumer, municipal and defense operations. Industrial control systems and widely dispersed control and monitoring stations interconnect over private and public telecommunications infrastructure and are susceptible to cyber attacks much the same as other critical infrastructure sectors. Visibility into the network communication that drives these systems can help enhance protection and reduce risks to these critical assets.

Request a Demo
img

Water

img-1

Water

The world depends on safe drinking water and it's a requirement for protecting public health. Wastewater removal is vital for to protect the environment and prevent disease that can affect health and well being. Business and industry operations require water to operate and product product and services upon which society relies. Without clean and available water, stability of the society and the economy rapidly breaks down. Industrial control systems are essential to treatment, storage and delivery of water. While many control systems is use are similar in principal, most are unique. Water and Wastewater systems are vulnerable to a variety of attacks, that can lead to water contamination; release of toxic chemicals physical attacks on systems and cyberattacks. A successful attack could result in significant widespread illnesses or casualties or disrupt delivery of water to those in need. Water and wastewater systems are a blending of discrete processes to open and close valves to direct and control the flow of water as well as controlled processes to ensure proper dosage and monitoring of water quality. Due to the dispersed nature of water systems, SCADA systems are widely employed to control the systems and gather critical data to aid in making decisions and addressing rapidly changing conditions in the system. The view and visibility into most water and wastewater systems is of the process itself and the product that's moved or produced. Yet, the network communication that links field instruments, devices and control components together as a system, as well as links systems to systems is a complex blind spot potentially susceptible to unintended or malicious activities that could affect the objectives of the water system. Monitoring and reacting to unusual network events can help improve operations, reduce costs and enhance protections for those dependent on these systems.

Request a Demo
img

What people are saying about us...

I like that I can see health and status without interacting with the devices and system

Director Security

Power Generation

I didn't expect to see so much traffic that has nothing to do with controlling my operation

Director Security

Chemical Plant

I've been waiting for this view of my control sytem for 20 years!

Director Security

Manufacturing

This approach saved us significantly with our inventory -- and keeps saving us money with it's protection capabilities

Director Security

Power Generation

NexDefense Resources

White Papers

NexDefense is the expert resource on cybersecurity for automation and control systems. Download our most recent whitepaper on Sophia, the first commercially available cybersecurity software for critical infrastructure.

  • client logo
  • client logo
  • client logo
  • client logo
  • client logo

Contact Us

HEADQUARTERS:

3423 Piedmont RD NE
Atlanta, GA 30305

GENERAL INFORMATION:
+1 404.600.1117
info@nexdefense.com


SUPPORT:
support@nexdefense.com


SALES:
sales@nexdefense.com

Send Us A Message