PAS Global, LLC announced the release of PAS Cyber Integrity 6.3. The new release includes risk analytics, which provides a unique approach to continuously measure and identify cybersecurity risks to multi-vendor OT (Operational Technology) endpoints, as well as forensic analysis capabilities that provide deep insight into the impact and propagation of a cyber attack.
PAS Cyber Integrity helps industrial companies secure their most critical assets – the OT systems that enable safe and reliable production. It enables companies to gather and maintain a complete, accurate inventory of OT cyber assets, capture configuration baselines, monitor for unauthorized configuration changes, automate a continuous vulnerability and patch management process across the enterprise, and implement a program for system backup and recovery.
PAS Cyber Integrity risk analytics enable industrial companies to:
- Continuously measure industrial endpoint security posture and provide visibility into cybersecurity risks: vulnerabilities, patch currency gaps, configuration baseline deviations, and unauthorized configuration changes down to the field instrument level.
- Identify OT endpoint security degradation and risk propagation so that OT security specialists, automation engineers, and risk/compliance managers can prioritize remediation and reduce industrial cybersecurity attack surfaces.
- Enable forensic investigations via extensive multi-vendor configuration and referential insight to provide foundational ICS cybersecurity, enterprise scalability, performance, and platform independence.
Sid Snitkin, ARC Advisory Group, commented, “Industrial facilities must swiftly identify and remediate OT asset cybersecurity risks to preserve operational safety and reliability. This can be challenging, as those securing vital OT systems may lack the visibility, context, and situational awareness needed to identify risks, prioritize remediation activities, and accelerate incident response and recovery. Cyber Integrity risk analytics provide a comprehensive view of cyber asset inventory, configurations, and vulnerabilities across industrial control systems.”