Honeywell today announced the latest release of Honeywell Forge Cybersecurity Suite that includes several enhancements to help ensure business continuity in the face of mounting cyberthreats, uncertain global business conditions and continued supply chain disruption associated with remote operations.
The new Honeywell Forge Cybersecurity Suite release (R200) incorporates new features such as enhanced industrial-grade remote access, increased asset discovery capabilities with active and passive functionality and improved cybersecurity risk monitoring.

Read More

Sept. 25, 2019: Honeywell Unveils New Software Platform To Simplify, Strengthen And Scale Industrial Cybersecurity
Honeywell Forge Cybersecurity Software resolves common security pain points for operational technology (OT) and Industrial Internet of Things (IIoT) to better protect customer sites from cyberthreats and rising security costs across the enterprise. Honeywell Forge improves cybersecurity performance—at a single site or across multiple sites—by increasing visibility into vulnerabilities and threats, enabling proactive action to mitigate risks and improving cybersecurity management efficiency.

Read More

Feb. 4, 2019: Honeywell Introduces First Industrial Cybersecurity Solution to Guard Against Malicious USB Device Attacks
New Secure Media Exchange (SMX) release goes beyond malware detection to identify next wave of USB attack types, keeping human authentication part of security. SMX now includes patent pending capabilities to protect against a broad range of malicious USB device attacks, which disrupt operations through misuse of legitimate USB functions or unauthorized device actions.

Read More

Nov. 1, 2018: New Honeywell Cybersecurity Research Reveals That Usb Devices Pose a Significant Threat to Industrial Facilities
New, first-of-its-kind research released today by Honeywell (NYSE: HON) shows that removable USB media devices such as flash drives pose a significant – and intentional – cybersecurity threat to a wide array of industrial process control networks. Data derived from Honeywell technology used to scan and control USB devices at 50 customer locations showed that nearly half (44 percent) detected and blocked at least one file with a security issue. It also revealed that 26 percent of the detected threats were capable of significant disruption by causing operators to lose visibility or control of their operations.

Read More

Oct. 02, 2018: Honeywell Launches New Industrial Cybersecurity Services to Address Customer Skills Gap
Honeywell has added new cybersecurity consulting services designed to help industrial and critical infrastructure customers identify and eliminate dangerous security weaknesses. The Honeywell CyberVantage™ Security Consulting Services portfolio now includes Penetration Testing, providing active “white-hat” hackers who exploit customer defenses in order to fix them. It also now offers System Hardening to reduce software vulnerabilities and assist customers in safely complying with global Center for Internet Security (CIS) industry benchmarks.

Read More

June 18, 2018: Honeywell Expands Managed Security Services to Help Customers Keep Pace with Industrial Cyber Security Threats
Honeywell (NYSE: HON) today introduced CyberVantage Managed Security Services to help its customers enhance their industrial control system (ICS) capabilities and increase protection against the growing threat of cyber security attacks. The new services build on Honeywell’s legacy portfolio of cyber security managed security services offerings and add new security analytics, device management and regionalized support services.

Read More

June 5, 2018: Honeywell Announces Multi-Site Industrial Cyber Security Solution to Meet Needs of Connected Operations
Honeywell (NYSE: HON) today announced a software solution to provide cyber security to industrial customers who manage diverse process control networks, sites and vendors. As customers continue their digital transformation and their industrial sites become more connected, integrating cyber security has become even more critical. The multi-site solution for cyber security management is based on Honeywell’s ICS Shield™, which provides a top-down operational technology (OT) security management solution for securing connected industrial control system (ICS) environments.

Read More

April 25, 2018: Honeywell Inaugurates Its First Asian Industrial Cyber Security Center in Singapore
Honeywell (NYSE: HON) today opened its first industrial cyber security center of excellence (CoE) in Asia. The center was developed with the support of the Singapore Economic Development Board (EBD) and designed to help defend the region’s industrial manufacturers against evolving cyber security threats.

Read More

February 13, 2018 : Honeywell Launches First Industrial Cyber Security Center Of Excellence In The Middle East
Honeywell (NYSE: HON) today announced the launch of its first industrial cyber security center of excellence (COE) at its Middle East headquarters in Dubai. The new COE is a pioneering technology center with a safe off-process environment to test and demonstrate process control network vulnerabilities and threats, train customers with real-time attack simulations and provide advanced customer consultations.

Read More

December 6, 2017 : Honeywell survey shows low adoption of industrial cyber security measures
Honeywell (NYSE: HON) today released a new study showing industrial companies are not moving quickly to adopt cyber security measures to protect their data and operations, even as attacks have increased around the globe. Almost two thirds of surveyed companies don’t monitor for suspicious behavior.

Read More

August 1, 2017 : Addition of Nextnine further strengthens Honeywell’s leadership in industrial
Honeywell (NYSE: HON) announced today that it has completed its acquisition of Nextnine Ltd., which was announced on June 13, 2017. Nextnine is a privately held, leading provider of industrial cyber security solutions. The business will be integrated into Honeywell’s Industrial Cyber Security group and will significantly strengthen Honeywell’s capability to offer multi-vendor, multi-site secure remote access, monitoring and support to protect industrial control systems and critical infrastructure against a growing threat of cyber attacks.

Read More

June 12, 2017 : Honeywell to Acquire Industrial Cyber Security Software Leader Nextnine
Honeywell (NYSE: HON) announced today that it has signed a definitive agreement to purchase Nextnine, a privately held provider of security management solutions and technologies for industrial cyber security. The addition of Nextnine’s industry-leading security solutions and secure remote service capabilities will enhance the Company’s existing range of innovative cyber security technologies and significantly increase Honeywell’s Connected Plant cyber security customer base.

Read More

June 8, 2017 : Honeywell Invests in Cyber Security Innovation Center in Asia Pacific
Honeywell (NYSE: HON) Process Solutions (HPS), with the support of the Singapore Economic Development Board (EDB), will establish a new industrial cyber security center of excellence (COE) for Asia Pacific in Singapore.The COE will feature a state-of-the-art cyber security research and development lab, an advanced training facility and a security operations center that provides managed security services.

Read More

April 4, 2017 : Honeywell Launches New Industrial Cyber Security Solution to Enable Secure Use of USB Devices
Honeywell (NYSE: HON) Process Solutions (HPS) today announced a new solution for industrial sites as they balance productivity and cyber security demands. Honeywell’s new Secure Media Exchange (SMX) protects facilities against current and emerging USB-borne threats, without the need for complex procedures or restrictions that impact operations or industrial personnel.

Read More

February 23, 2016 : Honeywell and Palo Alto Networks Team up to Protect Industrial Control Systems from Cyber Attacks
Honeywell Process Solutions and Palo Alto Networks®, the next-generation security company, today announced they will collaborate to boost the cyber security capabilities of control systems used by industrial facilities and critical infrastructure. This next-generation offering enhances Honeywell’s comprehensive portfolio of cyber security solutions including its Industrial Cyber Security Risk Manager platform.

Read More

June 24, 2015 : Honeywell and Intel Security Team to Secure Critical Infrastructure and Industrial Internet of Things
Honeywell Process Solutions and Intel Security today announced they will collaborate to bolster protection of critical industrial infrastructure and the Industrial Internet of Things (IIoT). Intel Security's McAfee® technologies will be integrated with Honeywell's Industrial Cyber Security Solutions, providing Honeywell customers with enhanced security software to protect their control systems from malware and misuse.

Read More

April 21, 2015 : Honeywell Technology First to Proactively Manage Cyber Security Risk for Industrial Sites
Honeywell Process Solutions today launched the first digital dashboard designed to proactively monitor, measure and manage cyber security risk for control systems for refineries, power plants and other automated production sites throughout the world that are at increasing risk of cyber attacks.

Read More

March 31, 2015 : Honeywell Expands Cyber Security Development Capabilities with new Research Lab
Honeywell Process Solutions announced the opening of the Honeywell Industrial Cyber Security Lab to advance its development and testing of new technologies and software to defend industrial facilities and operations such as refineries and manufacturing plants from cyber attacks.

Read More

November 11, 2014 : Honeywell survey uncovers 3 in 4 adults are fearful that cyber attacks could damage their country’s economy
A recent survey conducted by Ipsos Public Affairs Research uncovered that 36 per cent of respondents believed that it isn’t possible to stop all cyber attacks. A further similar amount reported they didn’t have faith in their country’s ability to keep up with cyber attacks because they felt governments and organisations are not taking these attacks seriously enough.

Read More

July 2, 2014 : Honeywell provides improved cyber security for QAFAC
Honeywell’s integrated control and safety solution, including a new fire and gas system, will improve automation at the plant and increase cyber security at Qatar Fuel Additives Company’s Mesaieed Industrial City plant, 50 kilometers south of Doha.

Read More

April 18, 2013 : Japanese industrial giant selects Honeywell cyber security solutions
One of Japan’s largest refining and petrochemical companies, Idemitsu Kosan, is modernizing its control systems at its Tokuyama Refining and Petrochemical Complex in western Japan. The site, which supplies energy and chemical raw materials, will deploy Experion® Process Knowledge System, Abnormal Situations Management, alarm management, and cyber-security solutions.

Read More

Binh Son Refining & Petrochemical Improves Cyber Security with Honeywell
With Honeywell’s MSS, security updates, BSR’s PCN are today better managed and constantly kept up to date. And with the MSS’s Secure Connection, an authenticated and encrypted Virtual Private (VPN) for Honeywell dedicated support engineers as well as Honeywell subject matter specialists to remotely troubleshoot security and maintenance issues, the site has seen reduction of downtime and more responsiveness to issues before further deterioration. Honeywell's Secure Media Exchange (SMX) further strengthens endpoint defenses by managing USB removable media and ports against cyber risk and unauthorized usage.

View Case Study

Cyber-Securing Honeywell PMT Sites
A wide range of Honeywell Process Solutions’ technologies and expertise underpin cyber security across Honeywell’s Performance Materials and Technologies sites, providing a robust but efficient solution for industrial plants.

View Case Study

Total Improves Cyber Security with Managed Security Services
With Managed Industrial Cyber Security Services, the Port Arthur Refinery has greater visibility into the cyber security and system conditions of its PCN architecture.

View Case Study

Honeywell Migration Solutions Help Saudi Electricity Company Revitalize Control System and Address Cyber Threats
The project was delivered with the latest hardware and software platforms and yielded higher reliability, enhanced performance and improved safety with the cyber security implementation.

View Case Study

U.S. Power Company works with Honeywell to perform a SCADA cyber security vulnerability assessment
Honeywell's cyber security assessment services helped a US power company to assess existing cyber security risks, abide by corporate standard of audit and review, and prioritize the tasks they needed to execute.

View Case Study

Cyber security vulnerability assessment reduces risks to gas pipeline operation
As a result of Honeywell’s cyber security vulnerability assessment solution, a natural gas pipeline company was able to empirically identify and quantify all of the steps required to improve the security and reliability of its natural gas distribution pipeline network, and therefore increase the uptime and availability of its system.

View Case Study

Honeywell helps Canadian power company design secure network for industrial environment
A Canadian power company was embarking on an environmental monitoring project at a coal-fired generation facility that involved the bridging of two control systems with their business network. The company required an expert consulting firm to address their security and integration issues. Honeywell advised the power company to design a multi-layered defense-in-depth network.

View Case Study

Let Honeywell take you into the future of Industrial Cybersecurity defence

If you want to protect your Industrial Control Systems (ICS), you must learn to understand how hackers think and act. Cybersecurity risks change quickly. To keep industrial processes safe, operators need to know how to anticipate, prevent and defend against threats to their control systems.

Honeywell’s Red Team and Blue Team ICS Cybersecurity training provides an unrivalled insight into the hacker’s mind from an operational technology (OT) perspective. Our experts don’t just provide in-depth insights into cybersecurity threats; they give you first-hand experience battling them, letting you go head-to-head with live adversaries.

Pick a Side

In a cutting-edge computer simulated training environment, you can practice your skills in turn-based contests. Blue Team defenders tackle Red Team attackers in realistic operational settings and real-world scenarios.

Trainees can see common attack sequences played out and how hackers look to exploit vulnerabilities, avoid detection and respond to countermeasures. It’s a unique opportunity to gain a deeper understanding of how hackers think and behave.

Defenders can then put their strategies for identifying and responding to attacks into practice.

The experts in operations and cyber security

In a four-day intensive course, Honeywell’s experts take trainees through all the key concepts:

• How all the cybersecurity pieces work together
• Practical industrial cybersecurity concepts
• Emerging trends in cyber attacks
• Vulnerabilities and attack vectors specific to industrial control systems
• Methods for responding to, adapting to and defending against active attacks
• Identifying areas of vulnerability within the organization
• Reporting and recommending countermeasures

Trainees will learn tools and techniques, such as reverse engineering, log and memory analysis, cyber forensics, vulnerability scanning, penetration testing and incident response – all from seasoned professionals and experts in both cybersecurity and operational technology.

They can then put all they’ve learned in the classroom into practice, honing their skills and learning to respond under pressure. It’s a unique experience for cybersecurity and plant managers, as well as IT security staff, engineers, operators, administrators and anyone else responsible for OT security.

Are you ready to defend your Industrial Control Systems?

To find out more about the training, please contact Honeywell Cybersecurity team.


USB Threats are More than Malware

Download White Paper

White Paper: USB Security - Myths vs. Reality Latest USB Security Threats & Best Practices to Follow
In this White Paper, we discuss about what makes USBs such a successful attack vehicle, advanced USB threats, USB Security - Myths vs. Reality and recommended best practices.

Download White Paper

eGuide: Overcoming the Industrial Cybersecurity Skills Gap Facing the Process Industries
There is a predicted global shortfall of 3.5 million cybersecurity jobs by 2021, up from 1 million openings last year. On top of that, 51 percent of organizations report having a problematic shortage of cybersecurity skills in 2018, up from 45 percent in 2017. In this eGuide, we discuss some of the best practices that enterprises and their boards can consider to tackle the ever-increasing skills gap.

Download eGuide

White Paper: Staffing for Cybersecurity: 5 Considerations for Plant Managers
In this white paper, we detail five key considerations for plant managers, drawn from the scope of work for defending industrial networks found in the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond and Recover.

Download White Paper

White Paper: How to Leverage Cyber Security Assessments to Attract the PCN Investments You Need
This white paper articulates pragmatic steps that operational engineering teams can take to attract the business investments they need to modernize their industrial control system environments - and make security an enabler instead of an inhibitor.

Download White Paper

Honeywell Industrial USB Threat Report: Universal Serial Bus (USB) Threat Vector Trends and Implications for Industrial Operators
With increasing pressure to limit network access to industrial control systems, industrial plant dependence upon USB removable media to transfer information, files, patches, and updates has been greater than ever. In context of these USB security concerns and ongoing threat vector changes, researchers from Honeywell’s Industrial Cyber Security team analyzed USB usage and behavioral data from live production sites globally.

Download Research Report

Article Reprint: What Are the Financial Savings from a Refinery Cyber Security Program?
In this Hydrocarbon Processing special focus article, the authors Tom Ayral from Honeywell and Mark Fligner from Liberty International Underwriters, share a first-pass financial estimate of the savings resulting from the implementation of a cyber security program for a 100-Mbpd refinery.

Download Your Copy

FIVE BIG REASONS Why Industrial Companies Should Invest in Cyber Security Now
Most industrial enterprises and manufacturing companies are by now fully aware that they are facing more serious threats to their cyber security than ever before. This white paper examines five compelling reasons why enterprises and their boards should take steps now, instead of dealing with the considerable and often underestimated consequences later.

Download White Paper

LNS Study: Putting Industrial Cyber Security at the Top of the CEO Agenda
Study reveals low adoption of cyber security capabilities and technology among industrial companies despite the increasing number of global industrial attacks and changing threat landscape. The study suggests that cyber security must be part of a CEO’s agenda to ensure the fast and effective long-term deployment of strategies and technologies. It also recommends three immediate actions.

Download Study

Remediating Identified Risk and Reducing Future Risk -
Are you equipped to prioritize and address the cyber security risks in your industrial control environment? Honeywell offers a free eBook to help you remediate identified risks and reduce future risks.

Download eBook

Science Fiction Becomes Reality
Instead of continuously reacting to the onslaught of security incidents, battle-tested security professionals continue to stress the importance of building a solid security program. Read this eBook to discover how you can stay ahead of advanced cyber threats and reduce risks for your plant(s).

Read eBook

The Essential Guide to Industrial Cyber Security
Cyber security is an acknowledged and growing threat to the operational integrity of process manufacturing and other critical infrastructure sectors. To combat this fast growing threat it is important to make a conscious change from reactive to proactive measures. Here’s a roadmap to help organizations evolve from reactive to preventive, proactive strategies for risk management.

Read eBook

The Four-Step Guide to Understanding Cyber Risk
It is estimated that cyber risks costs the global economy up to $400 billion a year— maybe even more. For industrial control systems (ICSs) however, the risks are even more acute. Understand vulnerabilities. Identifying threats. Measuring consequences. Bringing it all together and measure risk. This four-step guide will help you identifying cyber risks and addressing the cyber security gap.

Read eBook

Mitigating cyber security risks in legacy process control systems
Legacy control systems are more vulnerable to attacks than contemporary systems. Read this white paper to learn more about techniques for protecting legacy systems, the problems surrounding these techniques, and new methods for analyzing security.

Read White Paper

Staying ahead of today's cyber threats
The increasing number of cyber security threats requires evolving approaches and tools to combat potential attacks. Read this whitepaper to learn how application whitelisting can be used to combat viruses and malware.

Read White Paper

Application Whitelisting 101
Application Whitelisting is an effective tool for enhancing your "Defense in Depth" security strategy. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, Application Whitelisting can be an important addition to your security arsenal.

Read White Paper

Effective use of assessments for cyber security risk mitigation
This paper covers how cyber security assessments can be effectively used for risk mitigation and how they relate to the overall cycle of securing critical infrastructure.

Read White Paper

Cyber security regulations: Pipe dream or reality?
This whitepaper recommends that pipeline operators shift from reactive to proactive and begin the process of adopting a long-term cyber security strategy before regulations become mandated.

Read White Paper

Growing Risk of USB Threats To Industrial Systems
Honeywell industrial cybersecurity USB Threat Report -2020

Download PDF

Cyber Security Risk Management Infographic
Cyber threats to industrial control systems have rapidly emerged as a key risk to safety, efficiency and continued production across the process industries.

Download PDF

Securing Industrial Process against USB-Borne Threats
Since discovery of the Stuxnet computer virus, industrial organizations have struggled with finding secure ways to use and monitor removable media. Take a look at some interesting stats from the process industry and how to protect against USB-borne threats.

Download PDF

Industrial cyber security risk is on the rise, and reducing it is critical to a company's operational and production goals. Honeywell Industrial Cyber Security Risk Manager can help companies effectively migrate and rapidly respond to cyber vulnerabilities and threats.

Download PDF

Industrial Cyber Security: Perception vs. Reality.
Usher in Cyber Security Awareness Month with knowledge to fight cyber threats this October. Take a look at intriguing findings from a study that compares leading industry threat research with our own firsthand observations gleaned from hundreds of cyber security engagements worldwide.

Download PDF

Honeywell Forge Cybersecurity Suite Webinar: Japanese language version

世界中で6000サイト以上における導入実績持つ、ハネウェルのMSSとそのプラットフォームであるForge Cybersecurityについて、デモを交えてご紹介いたします。

Watch Webinar

Enable Business Continuity with Industrial Grade Secure Remote Access

Are you using VPN or Remote Desktop to access your control system (ICS/OT) remotely? Remote access is actively targeted by cyber attackers and their use could be endangering the safety and reliability of the ICS/OT. With the global situation and travel restrictions, imagine critical skills unable to provide on-site support or respond to an operational or cybersecurity event? Industrial operators are quickly evaluating remote access solutions as part of their business continuity planning to remotely support and operate their ICS/OT.

Watch Webinar

ACL Access Control List
AES Advanced Encryption Standard
AH Authentication Header
ARP Address Resolution Protocol
Active Attack Active attack is an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system Source
Adversary An adversary is a malicious entity whose aim is to prevent the users of the computer system from achieving data privacy, system integrity and availability. Actual adversaries are known as attackers
Alert An alert is a communication about a known cyber security issue, typically with details of how to mitigate the issue

Badware See Malware
BERT Bit Error Test
BIND Berkeley Internet Name Domain
BIOS Basic Input/Output System
BSS Basic Service Set
Blacklist (Application Blacklisting) Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only those known to contain security threats or vulnerabilities but also those that are deemed inappropriate within a given organization. Blacklisting is the method used by most antivirus programs, intrusion prevention/detection systems and spam filters Source
Business Continuity Planning (BCP) BCP involves keeping all essential aspects of a business functioning despite significant disruptive events, of which disaster recovery planning (DRP) is a subset of it.

Canaries A Canary is an early test version of software, alluding to a Canary in a coal mine
CERT Computer Emergency Response Team, sometimes aka Computer Security Incident Response Team. These are organizations, in APAC they are usually government-linked agencies, responsible for maintaining vigilance on cyber security threats and the need for creating awareness of such. Formerly, before CERTs evolved to such focus today, they were expert groups that handle computer security incidents. At national level, CERTs differ from one country to another in terms of their portfolio. Certain countries' CERTs are legislated with enforcement authority while others just at advisory functions.
Computer Network Defense Analysis Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats Source
CISO Chief Information Security Officer
Critical infrastructure Critical infrastructure are the assets, systems, and networks, whether physical or virtual, so vital to a country or company that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Source

DCS Distributed Control System. For Honeywell DCS offerings, please click here
Denial of Service (attack) A denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a server host serving mutliple users connected in a network.

Perpetrators of DoS attacks typically target sites or services hosted on mission-critical servers, including DCS/SCADA systems, or high-profile web servers such as banks, credit card payment gateways, and even root name servers.

DHCP Dynamic Host Configuration Protocol
DMZ Demilitarized Zone
DNS Domain Name System
Disaster Recovery Planning (DRP) Disaster Recovery Planning involves a set of policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions, as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity planning (BCP).

EAP Extensible Authentication Protocol
Endpoint Protection Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Source

FAT Factory Acceptance Test
Firewall A firewall is a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. It is a network security system that controls the incoming and outgoing network traffic based on an applied rule set.

FTP File Transfer Protocol

Governance Governance, largely in the context of corporate and IT, focuses on compliance in an organization's management of its operations and processes - in the best interest of stakeowners and shareholders. Governance has its interest in the set of multi-disciplinary structures, policies, process and procedural controls implemented to order to meet the statutory and regulatory compliance, legal, risk and environmental requirements.

Heartbeat Signals Heartbeat signals indicate the communication health of the system and is a periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a system
HMI Human-Machine Interface
Host Intrusion Detection Systems (HIDS) Developed for mainframe computers, HIDS is the earliest type of intrusion software that monitors and analyzes the internals of a computing system and sometimes the network packets on its network interfaces
HTTP Hypertext Transfer Protocol

IDPS Intrusion Detection and Prevention Systems
I/O Input/Output
ISASecure ISASecure independently certifies industrial automation and control (IAC) products and systems to ensure that they are robust against network attacks and free from known vulnerabilities. Source
ISC Internet Software Consortium

LAN Local Area Network
LR-WPAN Low-Rate Wireless Personal Area Networks

MAC Media Access Control
Malware Malware (short for malicious software) is any software used to disrupt a computers operation, collect sensitive data, or gain access to private computer systems. Also known as Badware
MISPC Minimum Interoperability Specification for PKI Components
MITM Man-in-the-Middle

NAT Network Address Table
NERC North American Electric Reliability Corporation
Network security The provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
Network Intrusion Detection Systems (NIDS) A network based device or software application that monitors network activities for malicious activities or policy violations and produces reports to a management station

OLE Object Linking and Embedding
OPC OLE for Process Control
OSI Open Systems Interconnectivity

PCS Process Control System
Penetration Testing Penetration testing is often confused as "vulnerability assessment" (VA). Essentially, it is a further step into simulating the exploitation on a system vulnerability discovered in a VA. Its purpose is to confirm if a security breach or a catastrophic damage can really be inflicted on the system if it would have been a real cyber attack.
PLC Programmable Logic Controller
PROFIBUS Process Field Bus

Qualified Anti-malware Definitions Testing and qualification of newly released anti-malware definition or signature files adds to system stability by identifying and restricting potential ICS conflicts before implementation on site.
Qualified OS Patch Updates Testing and qualification of newly released Microsoft security updates adds to system stability by identifying and restricting potential ICS conflicts before implementation on site.

Remote Terminal Unit A Remote Terminal Unit (or RTU) is a microprocessor-controlled electronic device that interfaces objects in the physical world to a DCS (distributed control system) or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects. For details of Honeywell's RTU offerings please click here

SCADA Supervisory Control and Data Acquisition
– for Honeywell's SCADA offerings please click here
Security Assessments and Audits Security assessments are usually with the purpose to survey and review the security health or posture of a system, processes or an organisation's susceptibility to cyber security threats. Audits are essentially inspections on the state of compliance to governance requirement. While security assessments would promptly raise findings on vulnerabilities for quick remediation, audits will aim to report on non-compliances and systemic weaknesses to executive management for managerial actions.
Security Information & Event Management (SIEM) SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM is sold as managed services, software, or appliances and are also used to log security data and generate reports for compliance purposes. SIEM is primarily about real-time monitoring, correlation of events, notifications and console views, and secondarily about reporting of log data and long-term archiving.
SIS Safety Instrumented System
SMTP Simple Mail Transfer Protocol
SSL Secure Sockets Layer

TCP Transmission Control Protocol
TDEA Triple Data Encryption Algorithm

UDP User Datagram Protocol
USB Universal Serial Bus

Vulnerability Assessment (VA) In a vulnerability assessment, data is collected from the system and compared with documented issues to deduce if the system is vulnerable to any known exploits. "Documented issues" refer to vulnerabilities or systems weaknesses that have been discovered and therefore known and, hence, they have been documented and most probably made available to the public for awareness. VA can be easily confused as "Penetration Testing" which essentially can be the next step into simulating the exploitation on a system vulnerability discovered during a VA.
VLAN Virtual LAN
VPN Virtual Private Network

WiFi Wireless Fidelity
WPA WiFi Protected Access

XSS Cross-Site Scripting

In this section we've provided a list of useful links to relevant websites. Bookmark this page so you can find it easier in the future.

GIAC Global Information Assurance Certification (GIAC) is the leading provider and developer of Cyber Security Certifications. www.giac.org
ISACA As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. www.isaca.org
ISA The International Society of Automation is a leading, global, nonprofit organization that is setting the standard for automation by helping over 30,000 worldwide members and other professionals solve difficult technical problems, while enhancing their leadership and personal career capabilities. www.isa.org
WIB WIB – Process Automation Users' Association. WIB provides process instrumentation evaluation- and assessment services for- and on behalf of – its industrial user member companies. www.wib.nl
VGB VGB is a technical association for power and heat generation. It is a non-profit organization and a voluntary association of companies of power plant operators and manufacturers. VGB published the cyber security standard - VGB-S-175. www.vgb.org

ANSSI Agence Nationale de la sécurité des systems d'information. ANSSI core missions are to detect and early react to cyber attacks, prevent threats, advice governmental entities and operators of critical infrastructure and inform industry and general public about security threats and protective measures. www.ssi.gouv.fr/en/
APCERT APCERT (Asia Pacific Computer Emergency Response Team) is a coalition of CERTs and CSIRTs (Computer Security Incident Response Teams), from 13 economies across the Asia Pacific region to ensure internet security in the Asia Pacific region. www.apcert.org
BSI Federal Office for Information Security, Germany. BSI's goal is to promote IT security in Germany. It is the first and foremost central IT security service provider for the federal government in Germany. www.bsi.bund.de
CERT Australia CERT Australia is the national computer emergency response team, working with major Australian businesses, providing cyber security advice and support to critical infrastructure and other systems of national interest. www.cert.gov.au
CERT-In The Indian Computer Emergency Response Team (CERT-In), under the Department of Information Technology of Ministry of Communications and Information Technology, works to enhance the security of India's communications and information infrastructure through proactive action and effective collaboration. http://deity.gov.in/content/icert
CPNI Centre for the Protection of National Infrastructure. CPNI protects UK national security by providing protective security advice. Their advice covers physical security, personnel security and cyber security/ information assurance. www.cpni.gov.uk
CNCERT/CC National Computer Network Emergency Response Technical Team/Coordination Center of China. CNCERT/CC is a non-governmental non-profit cybersecurity technical center and the key coordination team for China's cybersecurity emergency response community. www.cert.org.cn
ENISA European Union Agency for Network and Information Security. It is the 'pace-setter' for Information Security in Europe, and a centre of expertise. www.enisa.europa.eu
ICS-CERT The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) operates within the National Cybersecurity and Integration Center (NCCIC), a division of the Department of Homeland Security's Office of Cybersecurity and Communications (DHS CS&C). NCCIC/ICS-CERT is a key component of the DHS Strategy for Securing Control Systems. https://ics-cert.us-cert.gov/
OLF The Norwegian Oil and Gas Association have established a number of guidelines in the areas of Competence, Employment, Environment, HSE & Operations, Integrated Operations and Industrial Policy. OLF 104 recommends guidelines for information security baseline requirements for process control, safety and support ICT systems. www.norskoljeoggass.no/en

ICT QATAR The National Standards for Security of Critical Industrial Automation and Control Systems by ICT Qatar focuses on the various controls for the security of critical industrial automation and control systems. www.ictqatar.qa/en
NERC The North American Electric Reliability Corporation (NERC) is a not-for-profit international regulatory authority whose mission is to assure the reliability of the bulk power system in North America. www.nerc.com

ISS Source Industrial Safety and Security Source is a web-based information provider devoted solely to keeping manufacturers current on safety, cyber and physical security news, products, features, applications and trends. www.isssource.com
SC Magazine SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies. www.scmagazine.com
Security Magazine Security is uniquely focused on solutions for enterprise security leaders. It is designed and written for business-minded executives who manage enterprise risk and security. www.securitymagazine.com
Security Week Information Security News, IT Security News & Expert Insights www.securityweek.com

Honeywell Process Solutions on Twitter Get the latest news and offerings from Honeywell Process Solutions https://twitter.com/hwusers
Honeywell Process Solutions on LinkedIn Stay up to date with news and job opportunities from Honeywell Process Solutions https://www.linkedin.com/company/honeywell-process-solutions
Honeywell on YouTube See the latest news and stories from Honeywell www.youtube.com/user/Honeywell

Honeywell SMX Walkthrough Demo
Honeywell SMX Walkthrough

Honeywell Forge Cybersecurity Software
Honeywell Forge brings together our industry-leading software into one, OT cybersecurity platform that standardizes critical security capabilities.

Honeywell Forge for Cybersecurity: Meet Cyber Expert – Sema Tutucu
Sema Tutucu could be a superhero because her job is to fight the bad guys. She's protecting critical infrastructure from cyberattacks. Are you ready to shape your future? #futureshaper

How Honeywell Helps Customers Manage Cybersecurity Risks
Sam Wilson, Global Product Marketing Manager for Honeywell Industrial Cybersecurity discusses about how Honeywell is helping customers effectively manage cybersecurity risks on their digital transformation journey with Mark Sen Gupta, Director of Research for ARC Advisory Group.

Honeywell’s Industrial Cyber Security Center of Excellence, Middle East
The center of excellence, located in Dubai, is a demonstration of Honeywell’s commitment to addressing the industrial cyber security needs of customers in the Middle East region. The state-of-the-art facility will strengthen regional industrial cyber security preparedness by providing a safe environment to test process control network vulnerabilities and training customers through real-time attack simulations.

Study: Putting Industrial Cyber Security at the Top of the CEO Agenda
This study by LNS Research reveals low adoption of cyber security capabilities and technology among industrial companies despite the increasing number and sophistication of global industrial attacks. The study suggests that industrial cyber security must be part of a CEO’s agenda to ensure the fast and effective long-term deployment of strategies and technologies. It also recommends three immediate actions.

Secure Media Exchange (SMX) - Industrial Cyber Security Solution for USB Protection
Secure Media Exchange reduces cyber security risk and limits operational disruptions by monitoring, protecting, and logging use of removable media throughout industrial facilities. SMX provides plant operators with unprecedented control and visibility into the secure use of USB and removable media by personnel and contractors, reducing cyber risk to process control networks globally. SMX provides the latest in advanced threat detection capabilities to critical infrastructures and manufacturing facilities.

Secure Media Exchange (SMX) - Infographic Video on USB-Borne Threats
Industrial facilities are humming with people & productivity, but it takes hand-carried USB device updates to stay operational. Malware via removable media is ranked as the #2 ICS threat. Secure Media Exchange (SMX) reduces cyber security risk and limits operational disruptions by monitoring, protecting, and logging use of removable media throughout industrial facilities.​

Take a tour of Honeywell’s new cyber security research lab
Step inside the brand new Honeywell Industrial Cyber Security Lab in Duluth, Georgia. The lab's world-class environment is used to develop and test new cyber security solutions for the industrial market. It is another investment in Honeywell's ongoing commitment to help customers defend the availability, reliability and safety of their industrial automation and control systems.