Endpoint Protection

Endpoint Protection

  • Add to My Bookmarks
  • SHARE 
Within an industrial control system (ICS), each device creates a potential entry point for security threats. Endpoint protection is designed to secure each endpoint on the network before device access is granted. For example, Honeywell’s Application Whitelisting solution combats viruses and malware by allowing only known software to run on the Experion® Systems. Other Endpoint Protection services include end-node hardening and portable media & device security. 

 

Endpoint Protection assists in the prevention of industrial cyber-attacks by denying any applications that have not been previously identified as 'non-malicious'. The basic concept is to permit only trusted, known files to execute, rather than to block malicious code and activity. Surveys show that 25% of companies are already deploying some form of application control, and another 50% are seriously considering it.

Endpoint Protection contrasts with Device Control, which regulates access to removable devices and network resources such as USB-connected devices, Bluetooth devices, recordable CDs, DVDs and plug-and-play devices. Device Control software, which is executed on the end node, manages and controls data transfers from all desktops and laptops even when not connected to a corporate network. 

Honeywell provides various levels of software support through multiple channels, including its Global Technical Assistance Center (GTAC) support division and its Advanced Monitoring & Co-Management services (requires remote connectivity technology via Honeywell service node).

Honeywell delivers complete end point solutions integrating Endpoint Protection, device control and anti-virus to provide defense-in-depth best practices. Its flexible whitelisting service is tailored to the users’ operational requirements and allows plant personnel to focus on increasing productivity and optimizing performance. 

Honeywell’s approach is effective in actively protecting against emerging zero-day attacks. This is particularly crucial for legacy systems, which become more vulnerable to attacks over time due to a lack of fixes for newly disclosed threat vectors.

Honeywell's Endpoint Protection

  • Enables only trusted applications to run on process control networks

  • Reduces risk and cost of remediating malware issues

  • Protects by denying any applications that have not been previously identified as 'non-malicious', and Advanced Persistent Threats (APTs)

  • Identifies applications in the endpoint environment

  • Automates Exception Management process

  • Eliminates time-consuming signature updates and list management

  • Reduces the frequency of software patching.

Documentation
2 Documents FoundItems per page :
TitleUse SHIFT+ENTER to open the menu (new window).
DescriptionUse SHIFT+ENTER to open the menu (new window).
TypeUse SHIFT+ENTER to open the menu (new window).
Release DateUse SHIFT+ENTER to open the menu (new window).
CyberVantage Security Consulting Services brochureOverview brochure of CyberVantage Security Consulting Services.Brochure27 Sep 2018
Honeywell Industrial Cyber Security Overview BrochureOur complete portfolio leverages Honeywell’s industry-leading expertise and experience in process control and cyber security. Take a look at this overview brochure to know more.Brochure7 Sep 2018
 
 
 
 
Want to learn more about Endpoint Protection?

    Finding the information you need is important to us.

    Did you find what you were looking for today?

      Yes      No

    How likely are you to recommend HoneywellProcess.com to a colleague?

    • 0
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10

    Not at all likely

    Extremely likely

    How can we serve you better?

    Your email:

    Your email address will help us get in touch with you to resolve your query/ concern.