Government // Cybersecurity
News
3/14/2014
11:15 AM
Connect Directly
RSS
E-Mail
50%
50%

Lockheed Martin Acquires Cybersecurity Firm Industrial Defender

Acquisition of critical infrastructure cyber-security firm gives Lockheed Martin access to commercial markets while offering government customers a fuller suite of services.

Iris Scans: Security Technology In Action
Iris Scans: Security Technology In Action
(Click on image for a larger view.)

Lockheed Martin has expanded its cyber-security portfolio with the acquisition of Industrial Defender, a provider of cybersecurity products and services for critical infrastructure in the oil and gas, utility, and chemical industries.

The acquisition signals a shift in direction for the nation's largest defense contractor (based on a ranking by Washington Technology of government contracting revenues). The company plans to take its knowledge of securing government IT systems and apply it to critical infrastructure industries. Lockheed Martin's chair and CEO Marillyn Hewson called the acquisition "a natural extension of our commercial cybersecurity business [that] complements our information technology cybersecurity expertise."

Industrial Defender specializes in addressing cyber threats to technology used in operating industrial and chemical plants and in managing pipelines. The company's Automation Systems Manager provides a unified view into security, compliance, and change management activities across control systems. In addition to security, Industrial Defender offers products that enable IT-like visibility, monitoring, patch, configuration, and asset management for control systems.

[The Army's desktop-as-a-service plan gains cred at Pentagon in step to improve security. Read Army Expands Virtual Desktop Program.]

Lockheed Martin still derives most of its business from the Department of Defense and federal government agencies. Industrial Defender provides its technology to more than 400 companies in 25 countries. The acquisition, however, gives Lockheed's federal customers a fuller suite of services, a spokesperson for the company said.

The White House recently issued voluntary standards for improving cybersecurity for critical infrastructure industries.
(Image: California Environmental Protection Agency)
The White House recently issued voluntary standards for improving cybersecurity for critical infrastructure industries.
(Image: California Environmental Protection Agency)

The increasing complexity of cyber threats has raised significant concerns on the part of the Obama administration regarding the need to protect critical infrastructure in the US, including banking systems, communications and transportation networks, chemical plants, energy providers, and other vital industries.

In February the White House released the first version of its cybersecurity framework for privately owned critical infrastructure, a catalog of industry best practices and standards that companies can follow when developing better security programs. While the framework offers guidance to a broad range of companies in different industries, it leaves the choices of technology up to the user in addressing each category of risk management.

The framework stems from an executive order issued by President Obama last year. President Obama stressed the importance of strengthening the cybersecurity of critical infrastructure by "jointly developing and implementing" the framework. The executive order also instructed federal agencies to produce unclassified reports of threats to US companies and expanded the Enhanced Cybersecurity Services program to enable timely sharing of cyber threat information with critical infrastructure companies.

There were more than 48,000 cyber incidents involving government systems that agencies detected and reported to the Department of Homeland Security (DHS) in fiscal year 2012, according to a February 4 report published by Senator Tom Coburn (R-Okla.).

"Over more than a decade, the federal government has struggled to implement a mandate to protect its own IT systems from malicious attacks," Coburn said in the report. "As we move forward on this national strategy to boost the cybersecurity of our nation's critical infrastructure, we cannot overlook the critical roles played by many government operations, and the dangerous vulnerabilities which persist in their information systems."

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss. How to fight back? Think security that's distributed, stratified, and adaptive. Read our Advanced Attacks Demand New Defenses report today. (Free registration required.)

Elena Malykhina began her career at The Wall Street Journal, and her writing has appeared in various news media outlets, including Scientific American, Newsday, and the Associated Press. For several years, she was the online editor at Brandweek and later Adweek, where she ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
WKash
50%
50%
WKash,
User Rank: Author
3/14/2014 | 6:30:13 PM
Critical Infrastructure
Lockheed's move into the critical infrastructure makes sense, given the pull back in defense spending. But it's also likely to be a good way for industry to get up further up to speed in some of the cyber tech that the govt. has been using with greater effect.
WKash
50%
50%
WKash,
User Rank: Author
4/7/2014 | 4:27:44 PM
Deal completed
FYI -- We've learned that Lockheed Martin closed on its deal to acquire Industrial Defender. effective April 7. The company says Industrial Defender employees are now Lockheed Martin employees and that Lockheed Martin will continue to market acquired products and services with the Industrial Defender name (e.g. Lockheed Martin's Industrial Defender ASM®).
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.