PAS Global Releases PAS Cyber Integrity 6.0

March 18, 2018
PAS Cyber Integrity 6.0 now includes continuous vulnerability management providing immediate, comprehensive visibility into vulnerability risk within industrial process control networks.

PAS Global, LLC, provider of industrial control system (ICS) cyber security, process safety and asset reliability offerings in the energy, power and process industries, announces the general availability of PAS Cyber Integrity 6.0. The product now includes continuous vulnerability management providing immediate, comprehensive visibility into vulnerability risk within industrial process control networks. Cyber Integrity moves beyond traditional IT vulnerability management by also addressing the proprietary industrial control systems that comprise 80% of a facility environment, according to the company.

“Vulnerabilities remain hidden in many industrial facilities due to the lack of automated asset discovery and monitoring,” says Sid Snitkin, vice president of cyber security services at ARC Advisory Group. “PAS automates these inventory functions for proprietary and non-proprietary systems and leverages that data to identify which assets have published vulnerabilities. This provides a more complete view of enterprise risk as well as the ability to drive auditable, mitigating actions.”

PAS Cyber Integrity hardens security for the most mission-critical assets in a facility, the industrial control systems. Cyber Integrity works across the multi-vendor automation environment, providing foundational ICS cyber security, enterprise scalability, performance and platform independence. It also automates internal and regulatory compliance reporting while reducing associated efforts. Cyber Integrity enables industrial companies to:

  • Gather and maintain a complete, accurate inventory of traditional IT and proprietary operational technology cyber assets,
  • Baseline and monitor for unauthorized change to cyber-asset configurations,
  • Automate a continuous vulnerability and patch management process across the enterprise, and
  • Implement a program for system backup and recovery.