Using Inventory and Asset Discovery - PAS Integrity Software Suite - 7.3 - Help - Intergraph

Integrity Help

Language
English
Product
PAS Integrity Software Suite
Subproduct
Cyber
Search by Category
Help
PAS Version
7.3

Industrial control systems face growing risk from malicious or inadvertent changes. Hackers have increased their knowledge of industrial control systems and are becoming more coordinated and targeted in their efforts to take over process control systems. Engineering mistakes can go unnoticed and potentially affect production without automated detection in place.

With safety and profitability at stake, companies are taking steps to mitigate risk within their plants by maintaining an accurate inventory of both OT and IT assets, automating closed-loop patch management processes, and detecting and managing change to inventoried assets. Unfortunately, today's IT-focused security solutions do not address proprietary control assets sufficiently, and vendor-based solutions do not cover the heterogeneity of plant environments.

Cyber Integrity hardens industrial control systems against safety and reliability threats for the power and process industries by automating PCN inventory management, configuration baseline and policy enforcement, patch management, change management, reporting, and backup and recovery. Cyber Integrity provides these capabilities for the major control systems in a plant including OT and IT assets.

The following list highlights the key benefits:

  • Gain inventory visibility into IT and OT assets

  • Reduce compliance efforts by up to 90 percent

  • Avoid regulatory fines and penalties

  • Prevent unplanned downtime due to unauthorized changes

  • Manage across all major control system manufacturers

The Cyber Integrity web interface allows you to access the various Cyber Integrity features. This interface is similar to the Automation Integrity web interface, but the Cyber Integrity web interface provides many additional features, such as patch and vulnerability management. For more information, see Cyber Integrity Web Interface Overview.