Lockheed Martin Acquires Cybersecurity Firm Industrial Defender
Acquisition of critical infrastructure cyber-security firm gives Lockheed Martin access to commercial markets while offering government customers a fuller suite of services.
Iris Scans: Security Technology In Action
(Click on image for a larger view.)
Lockheed Martin has expanded its cyber-security portfolio with the acquisition of Industrial Defender, a provider of cybersecurity products and services for critical infrastructure in the oil and gas, utility, and chemical industries.
The acquisition signals a shift in direction for the nation's largest defense contractor (based on a ranking by Washington Technology of government contracting revenues). The company plans to take its knowledge of securing government IT systems and apply it to critical infrastructure industries. Lockheed Martin's chair and CEO Marillyn Hewson called the acquisition "a natural extension of our commercial cybersecurity business [that] complements our information technology cybersecurity expertise."
Industrial Defender specializes in addressing cyber threats to technology used in operating industrial and chemical plants and in managing pipelines. The company's Automation Systems Manager provides a unified view into security, compliance, and change management activities across control systems. In addition to security, Industrial Defender offers products that enable IT-like visibility, monitoring, patch, configuration, and asset management for control systems.
Lockheed Martin still derives most of its business from the Department of Defense and federal government agencies. Industrial Defender provides its technology to more than 400 companies in 25 countries. The acquisition, however, gives Lockheed's federal customers a fuller suite of services, a spokesperson for the company said.
The White House recently issued voluntary standards for improving cybersecurity for critical infrastructure industries.
(Image: California Environmental Protection Agency)
The increasing complexity of cyber threats has raised significant concerns on the part of the Obama administration regarding the need to protect critical infrastructure in the US, including banking systems, communications and transportation networks, chemical plants, energy providers, and other vital industries.
In February the White House released the first version of its cybersecurity framework for privately owned critical infrastructure, a catalog of industry best practices and standards that companies can follow when developing better security programs. While the framework offers guidance to a broad range of companies in different industries, it leaves the choices of technology up to the user in addressing each category of risk management.
The framework stems from an executive order issued by President Obama last year. President Obama stressed the importance of strengthening the cybersecurity of critical infrastructure by "jointly developing and implementing" the framework. The executive order also instructed federal agencies to produce unclassified reports of threats to US companies and expanded the Enhanced Cybersecurity Services program to enable timely sharing of cyber threat information with critical infrastructure companies.
There were more than 48,000 cyber incidents involving government systems that agencies detected and reported to the Department of Homeland Security (DHS) in fiscal year 2012, according to a February 4 report published by Senator Tom Coburn (R-Okla.).
"Over more than a decade, the federal government has struggled to implement a mandate to protect its own IT systems from malicious attacks," Coburn said in the report. "As we move forward on this national strategy to boost the cybersecurity of our nation's critical infrastructure, we cannot overlook the critical roles played by many government operations, and the dangerous vulnerabilities which persist in their information systems."
Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss. How to fight back? Think security that's distributed, stratified, and adaptive. Read our Advanced Attacks Demand New Defenses report today. (Free registration required.)
Elena Malykhina began her career at The Wall Street Journal, and her writing has appeared in various news media outlets, including Scientific American, Newsday, and the Associated Press. For several years, she was the online editor at Brandweek and later Adweek, where she ... View Full Bio
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.