Invensys announces Cyber Security Assessment Service

Invensys announces Cyber Security Assessment Service

July 25, 2013 - Invensys offers a cyber security assessment service to help its customers understand the risks that might impact the safety and reliability of their operations. The assessment is a key part of any security best practice program, helping to ensure critical infrastructure protection and compliance with corporate, industry and/or government mandates. Performed on-site, the control system assessment provides a baseline of the user’s current security position, and it can be used as the starting point to develop a strategy to meet the challenges of reducing and managing security risks.

The assessment, which includes the following service elements, allows Invensys to develop a unique and customized approach to addressing security issues:

  • Site and system assessment: A site review and system-specific vulnerabilities. The results of the assessment are provided in a conclusive report highlighting critical assets, vulnerabilities and risks.
  • Compliance assessment: Invensys addresses compliance status by reviewing operations and processes against required corporate compliance standards.
  • Establish security baseline: A security baseline allows customers to gauge progress against current status and operating models for security.

Invensys is at the forefront of automation and information systems and their intricate integration. The company has been in the controls industry for over 100 years and has pioneered many of the technology shifts that have allowed the modern control system to be so diverse, flexible, and open.
Service Overview:

  • Comprehensive approach is the vital first step in determining your security requirements;
  • Baseline and benchmark the security of your critical assets;
  • Appropriate and applicable industry standards, government regulations and mandates;
  • Identification and assessment of the risks that could impact your control system operation;
  • Gap analysis highlights and recommends mitigation necessary to improve security;
  • Assess policies, procedures and technical measures;
  • Vendor-neutral and applicable to all control systems and their interconnections.




  • Aegis supplies MES to Exception EMS

    Exception EMS is investing over £300k in an improved production system based around the Aegis FactoryLogix platform.

  • Top 5 problems with HMIs 
    Top 5 problems with HMIs

    By Jonathan Wilkins, European Automation
    The static days of the monolithic monitor are beginning to make way for smaller, portable interfaces that...

  • Xothermic diagnoses failure at glass manufacturing plant 
    Xothermic diagnoses failure at glass manufacturing plant

    Xothermic used B-Scada’s Status Enterprise software to identify a failed thermocouple in a furnace at the unidentified glass plant.

  • New Historian Simplifies Data Capture & Analysis 
    New Historian Simplifies Data Capture & Analysis

    By Bill Lydon, Editor
    Kepware Technologies recently introduced a new Local Historian Plug-In for the KEPServerEX communications platform and a...

  • Bah humbug! 
    Bah humbug!

    By Peggie Ward Koon, ISA
    ISA is working to secure control systems using ISASecure components and systems from the ISA Security Compliance...