PAS Global, LLC announced the general availability of PAS Cyber Integrity 6.0. The product now includes continuous vulnerability management providing immediate, comprehensive visibility into vulnerability risk within industrial process control networks. Cyber Integrity moves beyond traditional IT vulnerability management by also addressing the proprietary industrial control systems that comprise 80 percent of a facility environment.
PAS Cyber Integrity hardens security for the most mission-critical assets in a facility, the industrial control systems. Cyber Integrity works across the multi-vendor automation environment, providing foundational ICS cybersecurity, enterprise scalability, performance, and platform independence. It also automates internal and regulatory compliance reporting while reportedly reducing associated efforts by up to 90 percent.
Cyber Integrity Benefits
Cyber Integrity helps enable industrial companies to:
Gather and maintain a complete, accurate inventory of traditional IT and proprietary operational technology cyber assets,
Baseline and monitor for unauthorized change to cyber asset configurations,
Automate a continuous vulnerability and patch management process across the enterprise, and
Implement a program for system backup and recovery.
Cyber Integrity is a proven solution built upon the PAS Integrity platform, which manages configurations for hundreds of worldwide customers. PAS’ technology solutions are used at over 1,100 industrial facilities including 13 of the top 15 chemical companies, 10 of the top 15 refining companies, and 5 of the top 15 power companies in the world.
PAS, a leading provider of software solutions for ICS cybersecurity, process safety, and asset reliability, will showcase the new Cyber Integrity release at the S4x18 conference in Miami on January 16-18, 2017.
Sid Snitkin, ARC Advisory Group, commented, “Vulnerabilities remain hidden in many industrial facilities due to the lack of automated asset discovery and monitoring. PAS automates these inventory functions for proprietary and non-proprietary systems and leverages that data to identify which assets have published vulnerabilities. This provides a more complete view of enterprise risk as well as the ability to drive auditable, mitigating actions.”