Your one-stop web resource providing safety and security information to manufacturers

PAS Global, LLC released PAS Cyber Integrity 6.3, which includes risk analytics that continuously measures and identifies cybersecurity risks to multi-vendor OT (Operational Technology) endpoints, as well as forensic analysis capabilities that provide deep insight into the impact and propagation of a cyber attack.

PAS Cyber Integrity helps industrial companies secure their most critical assets – the OT systems that enable safe and reliable production.

It enables companies to gather and maintain a complete, accurate inventory of OT cyber assets, capture configuration baselines, monitor for unauthorized configuration changes, automate a continuous vulnerability and patch management process across the enterprise, and implement a program for system backup and recovery.

PAS Cyber Integrity risk analytics enable industrial companies to:

Cyber Security

Continuously measure industrial endpoint security posture and provide visibility into cybersecurity risks: Vulnerabilities, patch currency gaps, configuration baseline deviations, and unauthorized configuration changes down to the field instrument level.

Identify OT endpoint security degradation and risk propagation so OT security specialists, automation engineers, and risk/compliance managers can prioritize remediation and reduce industrial cybersecurity attack surfaces.

Enable forensic investigations via extensive multi-vendor configuration and referential insight to provide foundational ICS cybersecurity, enterprise scalability, performance, and platform independence.

“Our customers must continuously measure multi-vendor OT endpoint security posture and visualize risk propagation to ensure safe and reliable production,” said Mark Carrigan, chief operating officer at PAS Global, LLC. “Cyber Integrity enables OT cybersecurity professionals to discover cybersecurity risks, expedite remediation, and facilitate forensic analysis and response for OT devices down to level 0 – something that network-based monitoring solutions simply cannot do.”

Pin It on Pinterest

Share This