Tools: Application Whitelisting

Tools: Application Whitelisting

  • Email to a Friend
  • Add to My Bookmarks

Honeywell’s application whitelisting solution combats viruses and malware by allowing only known software to run on the Experion® Process Knowledge System (PKS). It is a good safeguard against certain zero day intrusions where users have no prior awareness of vulnerability. In addition, it enables better change management and protection against unauthorized changes to system configuration.

Honeywell’s application whitelisting solution protects users from unwanted intrusions by permitting only applications and executable files that are considered safe and on an ‘approved list’ to run, while blocking everything else. 

Application whitelisting helps users:

  • Enforce a list of approved applications,

  • Include an administration tool that allows for adjustment to the whitelist, and

  • Monitor and report attempts to violate the policy.

The application whitelisting solution is supplemented by a set of services delivered as part of Honeywell’s Industrial IT Solutions. 

Since industrial control systems do not have the luxury of locking down their systems when faced with a potential malware threat, the application whitelisting solution is applied in a monitor-only mode. This allows visibility into executables running on a system while allowing for standard operation and continued availability.

Honeywell’s application whitelisting solution helps quarantine unauthorized software upon discovery, quarantine after blocking, and enhance whitelist management. In addition, it helps produce a file system inventory that can accelerate verification of software on a hardware platform, thereby enabling utilities and facilities to stay ahead of the curve when responding to potential security threats.

With the industrial cyber security threat landscape continuing to evolve, application whitelisting helps Experion PKS users meet their increased security needs without having to earmark a lot of resources and time for managing their control systems. 

Documentation
6 Documents FoundItems per page :
TitleUse SHIFT+ENTER to open the menu (new window).
DescriptionUse SHIFT+ENTER to open the menu (new window).
File SizeUse SHIFT+ENTER to open the menu (new window).
TypeUse SHIFT+ENTER to open the menu (new window).
Release DateUse SHIFT+ENTER to open the menu (new window).
White Paper Effective Use of Assessments for Cyber Security Risk MitigationThe paper covers how cyber security assessments can be effectively used for risk mitigation and how they relate to the overall cycle of securing critical infrastructure.489.76 KBWhitepaper10 Jan 2014
Treating Security Like SafetyThis paper explores the current differences in treatment of safety and security, discusses reasons for the different treatments and necessary steps to make security an equal player to safety in manufacturing automation.108.59 KBWhitepaper10 Jan 2014
Application Whitelisting Service NoteApplication Whitelisting (AWL) for industrial control systems allows only approved or “safe” software to operate while blocking other, potentially unsafe and unauthorized applications from running.218.64 KBService Note11 Dec 2013
Application Whitelisting Reduces Cyber Security RiskWhite Paper that reviews Honeywell's Application Whitelisting tool which reduces risk of cyber vulnerabilities. 683.98 KBWhitepaper15 May 2013
Staying Ahead of Today’s Cyber ThreatsThe increasing number of cyber security threats requires evolving approaches and tools to combat potential attacks. Download this whitepaper to learn how application whitelisting can be used to combat viruses and malware.786.04 KBWhitepaper15 Oct 2012
IITS WP Application WhitelistingApplication Whitelisting is one of the latest tools offered to enhance “Defense in Depth” security strategy. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, Application Whitelisting can be an important addition to the overall security arsenal.683.98 KBWhitepaper27 Jul 2012
Get Microsoft SilverlightCyber Security Demo
Want to learn more about Application Whitelisting?