Configuration Management

Based on Inventory in Depth, PAS Cyber Integrity™ establishes a configuration security baseline, monitors for unauthorized change, and drives incident response protocols providing cybersecurity for both proprietary and traditional IT systems as well as auditable compliance processes. Learn more >

Can You Identify an Unauthorized Change to a Proprietary System's Control Strategy?

Fact: A reliable configuration security baseline is critical to identify unauthorized control system changes and driving audit-supporting investigation and remediation.
 

Do you have the insight needed to track, alert, remediate, and audit configuration changes?

The Missing Link: A Reliable Configuration Baseline

For effective change management, a comprehensive baseline must reflect the complex configurations and interdependencies between these disparate, proprietary systems.
 
Learn More

Monitor the ICS Endpoints that Matter Most

DCS

  • I/O Cards
  • Controllers
  • COM Modules
  • Operator Stations
  • Application Stations
  • Wireless I/O Modules
  • Control Level Firewall
  • Applications

PLC/Vibration Monitoring

  • I/O Cards
  • Controllers
  • COM Modules
  • 3rd Party Module
  • Applications

SIS/Turbine Control

  • I/O Cards
  • Controllers
  • COM Modules
  • Applications

Instrumentation

  • Wireless Devices
  • Foundation Fieldbus Devices
  • HART Devices
  • Relays

Detect Unauthorized Changes in the PCN

  • Capture a reliable, comprehensive configuration security baseline
  • Detect unauthorized configuration changes before they become a problem
  • Automate alerts and policies to support cybersecurity requirements
  • Remediate unauthorized changes using workflow-driven incident response protocols
Learn More
Cyber Integrity