Honeywell Industrial Cyber Security Portfolio
-
Upload
honeywell-process-solutions -
Category
Technology
-
view
173 -
download
1
Transcript of Honeywell Industrial Cyber Security Portfolio
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Architecture & Design
Assessments& Audits
PEOPLEPROCESS
TECHNOLOGY
We address cyber security end-to-end with technology, and importantly people and processes as well
Network & Wireless Assessments
Security AuditsSecurity Assessments
The first step to security is
understanding the current environment
Assessments& Audits
Assessments& Audits
PEOPLEPROCESS
TECHNOLOGY
Benefits
• Identify and prioritize the biggest risks
• Find systems and devices that are most exposed and vulnerable
• Meet industry and government regulations and guidelines
• Prioritize cyber security efforts for maximum return
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Architecture & Design
Assessments& Audits
Assessments& Audits
PEOPLEPROCESS
TECHNOLOGY
The first step to security is
understanding the current environment
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Architecture & Design
Assessments& Audits
Current State Analysis
Zones & ConduitsDesign & Optimization
PEOPLEPROCESS
TECHNOLOGY
Once you’ve found a gap, fill it
Benefits• Use network design to promote strong security
• Implement Zones & Conduits (per ISA 62443) to minimize the impact of an incident
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Architecture & Design
Assessments& Audits
Architecture & Design
PEOPLEPROCESS
TECHNOLOGY
Once you’ve found a gap, fill it
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Benefits
Assessments& Audits
Architecture & Design
Network Security
PEOPLEPROCESS
TECHNOLOGY
Access Control Policy Development
Firewall Intrusion Prevention
Most threats come from the network
Situational Awareness
Response & Recovery
Benefits• Make it harder for the “bad guys” to get in
• Prepare for situations if/when they do get in
Assessments& Audits
Architecture & Design
Network SecurityNetwork Security
PEOPLEPROCESS
TECHNOLOGY
Most threats come from the network
Situational Awareness
Response & Recovery
EndPoint Protection
Network Security
Benefits
Assessments& Audits
Architecture & Design
Endpoint Protection
PEOPLEPROCESS
TECHNOLOGY
End Node Hardening
Portable Media & Device Security
Patching & Anti-Virus
Application Whitelisting
“Soft” systems are easy targets
Response & Recovery
Benefits• Identify which PCs and servers are vulnerable to threats
• Determine if proper access controls are in place
Assessments& Audits
Endpoint ProtectionEndpoint
Protection
PEOPLEPROCESS
TECHNOLOGY
“Soft” systems are easy targets
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Benefits
Assessments& Audits
Architecture & Design
Situational Awareness
PEOPLEPROCESS
TECHNOLOGY
Continuous Monitoring
Security Analytics & Security Awareness
Training
Security Information& Event Management
(SIEM)
Compliance & Reporting
Awareness is critical
Endpoint Protection
Network Security
Assessments& Audits
Architecture & Design
Benefits
• Stay diligent with limited security staff & resources
• Identify the early-warning signs to prevent incidents
• Understand what’s happening, what’s at risk, and why
• Know what to do if/when an incident does occur
Situational AwarenessSituational Awareness
PEOPLEPROCESS
TECHNOLOGY
Awareness is critical
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Architecture & Design
Assessments& Audits
Response & Recovery
PEOPLEPROCESS
TECHNOLOGY
Incident ResponseBackup & Restore
“We have a problem…”
Situational Awareness
Endpoint Protection
Network Security
Architecture & Design
Assessments& Audits
Response & Recovery
Benefits• Know what to do when an incident occurs
• Ensure fast recovery
• Regain safety and reliability
PEOPLEPROCESS
TECHNOLOGY
“We have a problem…”
Situational Awareness
EndPoint Protection
Network Security
Architecture & Design
Assessments& Audits
Situational Awareness
Response & Recovery
Endpoint Protection
Network Security
Architecture & Design
Assessments& Audits
Managed Services
Continuous Monitoring & Alerting
Protection Management
Intelligence Reporting
Perimeter and Intrusion Management
Take out the uncertainty and complication of industrial cyber security implementation
PEOPLEPROCESS
TECHNOLOGY
Honeywell Industrial Cyber SecurityIndustry leading
experience and expertiseProven end-to-end
solutionsAdvanced technology
www.becybersecure.com