IT in Manufacturing


Honeywell enhances cyber defence tools

October 2012 IT in Manufacturing

Honeywell has announced a fully certified application control and whitelisting solution to help combat viruses and malware from attacking its Experion Process Knowledge System control system platform. Whitelisting is an important tool in Honeywell’s evolving cyber security arsenal that protects from unwanted intrusions by permitting only applications and executable files that are considered safe and on an ‘approved list’ to run, while blocking everything else.

“Experion PKS users want increased cyber security as well as to spend less time managing the control system,” says Mike Baldi, chief cyber security architect for Honeywell Process Solutions. “Application control and whitelisting is another tool to help them balance the need for security with available resources.”

Whitelisting solutions have been deployed in business IT environments for years, but their introduction into automation control systems is relatively new. Two major Honeywell control systems customers have been extensively piloting the solution through rigorous testing in specialised, mission-critical environments and providing crucial feedback on their experiences.

“Integrated business and production systems require careful design and infrastructure to ensure selective access and security. Honeywell is committed to helping customers strengthen their cyber security by providing best-in-class technology in a manageable, scalable fashion,” adds Baldi. “Application control and whitelisting is a good safeguard against some zero day intrusions where defenders have no prior awareness of vulnerability. It enables better change management and protection against unauthorised alterations to the system configuration.”

The solution is the result of an agreement between Honeywell Process Solutions and technology partner, Bit9 who is the global leader in advanced threat protection for endpoint protection and Windows server security. Bit9’s customers come from a wide variety of industries including e-commerce, financial services, government, healthcare, retail, technology and utilities.

Application control and whitelisting is currently available to Honeywell customers and is an additional layer of protection for industrial systems and networks which should be part of an overall security program. Honeywell’s Industrial IT Solutions’ global team of experts offer a full spectrum of defense in-depth solutions and services to protect automation manufacturers.

For more information contact Boni Magudulela, Honeywell Southern Africa, +27 (0)11 695 8000, [email protected], www.honeywell.co.za





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Enhancing cyber security for industrial drives
Siemens South Africa IT in Manufacturing
The growing connection between production networks and office networks as part of IT/OT integration and the utilisation of IoT have many benefits for industrial companies. At the same time, they also increase the risk of cyber threats. Siemens ensures that your know-how and plants are protected at all times.

Read more...
Immersion cooling systems for data centres
IT in Manufacturing
The demand for data centres in Africa is growing. The related need for increasing rack densities brings with it escalating cooling requirements.

Read more...
Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
Protecting industrial networks with resilient defence
RJ Connect IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...