View
Sorting
From A to Z
Products found: 2
Honeywell Forge Cybersecurity Platform
Sneaking in Cyber Threats
Seemingly innocent-looking flash drives are convenient — for attackers.
Your Connections Are Safe and Sound
As fast as industrial devices are connecting to each other and the cloud, we're developing software that helps you identify and act on cyber-related incidents, all in one place. You can see—and reduce—security risks, to keep operations running undisturbed.
Security Informed by Understanding Your Industry
Domain Expertise
From Agritech to Utilities
We've worked closely with businesses like yours for decades. Our 250+ cybersecurity experts and our unique threat research will help you navigate the constantly changing security landscape.
Innovation
IIoT Threats Never Sleep
One thing is for sure: Connectivity will grow exponentially. Our software scales and simplifies your security – while it continuously protects.
Partnership
Support Any Time, Everywhere
There is no one-and-done in 360-degree cyber protection. As new needs emerge, we'll provide global resources around the clock to protect your organization.
-
-
ROI-
-
20
1
Honeywell ICS Shield
What Is It?
ICS Shield is Honeywell’s top-down OT security management platform for securing connected Industrial Control Systems (ICS)/SCADA environments. Empowering organizations to implement connected operations while minimizing security vulnerabilities, ICS Shield secures remote field assets from a single security and operations center. This field-proven technology automates the deployment and enforcement of plant-wide security policies while focusing on security essentials.How Does It Work?
Discover. The first step in protecting an OT environment is identifying precisely what’s on the network. ICS Shield helps you achieve an accurate inventory of your ICS assets including hardware, software and service configurations. Connect. To maintain high levels of security, uptime and safety of distributed devices, secure remote access to field assets is required by first- and third-party personnel and machines. Providing extremely granular and robust AAA remote access, ICS Shield ensures secure remote access and monitoring, protected file distribution to devices, and safe data transfer from plants to HQ for analysis and risk management. Protect. ICS Shield unifies and automates the policy management process, empowering the creation, deployment and enforcement of plant-wide and granular security policies. Leveraging ICS Shield’s security policy management, operations and control teams significantly improve OT security and compliance. Scale. ICS Shield infrastructure is designed for multi-site, multi-vendor deployment, with all sites connected to the security and operations center via Honeywell’s Secure Tunnel. This distributed architecture guarantees data security and integrity. Features: Secure remote access Allows remote users to connect to devices in the site via RDP and VNC protocols. Site administrators can set security policies to govern remote access (can allow/deny/require manual approval for all connections, or set policy for individual users). Encrypted two-factor authentication Provides an additional layer of security for all users connecting to a Security Center. In addition to requiring a username and password, users must provide further proof of their identity. This is often something like an RSA token that generates a second numeric password which changes several times every minute. When logging in, users must provide their username and password along with this secondary password. Password vault Allows administrators of a site to store remote access passwords in a local "vault". Approved remote access users can connect with these credentials without the site administrator needing to share the passwords. This eliminates the need to share plaintext passwords with users, and simplifies changing system passwords to meet security policies (remote users don't need to worry about the password changes) Complete auditing Creates a complete recording of all remote access sessions which can be played back at any time from the Security Center. Details about authorized remote access sessions can also be included in reports. Initial active asset discovery An administrator provides appropriate credentials to the active asset discovery, which then searches the network for PC and network devices, and tries to gather information about them using those credentials. As part of the Essential bundle, this is a one-time discovery to populate the device database initially, but not find devices that are added/removed/changed in the future.-
-
ROI-
-
14
12