DATA SECURITY

Honeywell to Introduce Advanced Incident Response and Monitoring Service for Improving OT Cybersecurity and Operation

Honeywell | June 14, 2021

A global leader in industrial cybersecurity, Honeywell (NASDAQ: HON), has announced the introduction of the Honeywell Advanced Monitoring and Incident Response (AMIR) service. It provides rapid response for emerging and current cyber threats and 24/7 operational technology (OT) cybersecurity detection.

AMIR is a easy to deploy, cost-effective, scalable cybersecurity service that is customized to help OT and IT security teams that is struggling to cope up with the emerging cyber threats that mainly target industrial operational technology networks and control systems (ICS), which happens due to budget constraints and lack of expertise.


AMIR comes as part of Honeywell Forge Managed Security Services (MSS). MSS is an an end-to-end security as a service solution that helps protect control systems, operations, and OT environments. By "hunting" for various anomalous behaviors, including both emerging and known cybersecurity threats, AMIR constantly screens OT environments. It examines indicators of compromise and signals operators to possible problems before major damage can happen. Using proprietary technology, AMIR correlates, collects, prioritizes, and analyzes security proceedings and log data from numerous sources, giving a complete approach to better lessen cyber risk and maintain cybersecurity compliance.

The offerings of the AMIR are already being installed at many sites globally to help companies increase their maturity of cybersecurity. AMIR is combined with the bigger Honeywell Forge Cybersecurity portfolio intended to help further support cyber defenses for functioning surroundings.

About Honeywell

A Fortune 100 technology company, Honeywell delivers industry specific solutions such as control technologies for buildings and industry, aerospace products and services, and performance materials globally. Technologies of Honeywell help buildings, aircraft, manufacturing plants, and supply chains.

Spotlight

95 % of security breaches involve human error. Yet, only 11% of global companies conduct monthly awareness training. Mimecast Awareness Training delivers effective online security training to employees in roughly three minutes a month. Each monthly training module is anchored on a short video in the contemporary workplace and driven by characters your employees will recognize all too well.

Spotlight

95 % of security breaches involve human error. Yet, only 11% of global companies conduct monthly awareness training. Mimecast Awareness Training delivers effective online security training to employees in roughly three minutes a month. Each monthly training module is anchored on a short video in the contemporary workplace and driven by characters your employees will recognize all too well.

Related News

DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY

Persistent Launches Innovative Cyber Recovery Solution with Google Cloud

Persistent | October 31, 2022

Persistent Systems, a global Digital Engineering provider, today announced the launch of a trailblazing solution that enables organizations to recover more quickly from cyber-attacks. Together with Google Cloud, the Persistent Intelligent Cyber Recovery (PiCR) solution provides a comprehensive and scalable cyber recovery approach, allowing organizations to reduce data loss and minimize the negative impact to brand reputation from prolonged downtime. Persistent Intelligent Cyber Recovery is now available on the Google Cloud Marketplace. Hackers are increasing the frequency and scale of ransomware attacks. They are using continually evolving and sophisticated techniques, which makes recovery from attacks more challenging. These attacks may lead to sensitive data leakage, loss of business, and damage to brand reputation. It is crucial for organizations to not only focus on protection against cyber-attacks but also strengthen their recovery process. Traditional backup and Disaster Recovery (DR) solutions are not designed for recovery from cyber-attacks. Persistent Intelligent Cyber Recovery includes tailored recovery plans, Persistent IP for finding and remediating malware, and the optional managed services to administer the recovery process. Persistent's solution integrates with Google Cloud to provide a secure recovery environment and Google Cloud Backup and DR for protecting the server images. Persistent Intelligent Cyber Recovery offers the following benefits: Reduction in data loss Decreased risk of recurrent attacks through the removal of malware Faster recovery from ransomware and zero-day attacks (from weeks/months to hours/days) Potential cyber insurance cost reduction Scalable solution depending on enterprise size challenges Nitha Puthran, Senior Vice President – Cloud, Infrastructure and Security, Persistent: "The digital environment today is constantly evolving and so are the risks associated with it. We are leveraging our strong relationship with Google Cloud and our product engineering expertise to create an industry-leading solution that allows enterprises to recover faster from cyber-attacks, thereby reducing the impact on their business. "Persistent Intelligent Cyber Recovery combines strategic planning and the creation of playbooks, integration with Google Cloud services and our own IP to find anomalies that indicate malware, remove the malware, and use automation to set up test and production environments to scale. It takes a services and product mindset to create a solution like Persistent Intelligent Cyber Recovery and Persistent is uniquely positioned in the market to deliver both." Dai Vu, Managing Director, Marketplace and ISV GTM Programs, Google: "As cyber threats become more prevalent, customers need solutions that can help them quickly address and recover from cyber-attacks. With the Persistent's Intelligent Cyber Recovery (PiCR) solution available on Google Cloud Marketplace, customers can quickly deploy PiCR to their Google Cloud environment and utilize it alongside Google Cloud technologies and capabilities to address cyber-attacks quickly and securely."

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Palo Alto Networks Announces Medical IoT Security to Protect Connected Devices Critical to Patient Care

Palo Alto Networks | December 05, 2022

As healthcare providers use digital devices such as diagnostic and monitoring systems, ambulance equipment, and surgical robots to improve patient care, the security of those devices is as important as their primary function. Today, Palo Alto Networks (NASDAQ: PANW) announced Medical IoT Security — the most comprehensive Zero Trust security solution for medical devices — enabling healthcare organizations to deploy and manage new connected technologies quickly and securely. Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust by continuously verifying every user and device. "The proliferation of connected medical devices in the healthcare industry brings a wealth of benefits, but these devices are often not well secured. For example, according to Unit 42, an alarming 75% of smart infusion pumps examined on the networks of hospitals and healthcare organizations had known security gaps. "This makes security devices an attractive target for cyberattackers, potentially exposing patient data and ultimately putting patients at risk." Anand Oswal, senior vice president of products, network security at Palo Alto Networks While a Zero Trust approach is critical to help protect medical devices against today's innovative cyberthreats, it can be hard to implement in practice. Through automated device discovery, contextual segmentation, least privilege policy recommendations and one-click enforcement of policies, Palo Alto Networks Medical IoT Security delivers a Zero Trust approach in a seamless, simplified manner. Medical IoT Security also provides best-in-class threat protection through seamless integration with Palo Alto Networks cloud-delivered security services, such as Advanced Threat Prevention and Advanced URL Filtering. The new Palo Alto Networks Medical IoT Security uses machine learning (ML) to enable healthcare organizations to: Create device rules with automated security responses: Easily create rules that monitor devices for behavioral anomalies and automatically trigger appropriate responses. For example, if a medical device that typically only sends small amounts of data unexpectedly begins to use a lot of bandwidth, the device can be cut off from the internet and security teams can be alerted. Automate Zero Trust policy recommendations and enforcement: Enforce recommended least-privileged access policies for medical devices with one click using Palo Alto Networks Next-Generation Firewalls or supported network enforcement technologies. This eliminates error-prone and time-consuming manual policy creation and scales easily across a set of devices with the same profile. Understand device vulnerabilities and risk posture: Access each medical device's Software Bill of Materials (SBOM) and map them to Common Vulnerability Exposures (CVEs). This mapping helps identify the software libraries used on medical devices and any associated vulnerabilities. Get immediate insights into the risk posture of each device, including end-of-life status, recall notification, default password alert and unauthorized external website communication. Improve compliance: Easily understand medical device vulnerabilities, patch status and security settings, and then get recommendations to bring devices into compliance with rules and guidelines, such as the Health Insurance Portability Accountability Act (HIPAA), General Data Protection Regulation (GDPR), and similar laws and regulations. Verify network segmentation: Visualize the entire map of connected devices and ensure each device is placed in its designated network segment. Proper network segmentation can ensure a device only communicates with authorized systems. Simplify operations: Two distinct dashboards allow IT and biomedical engineering teams to each see the information critical to their roles. Integration with existing healthcare information management systems, like AIMS and Epic Systems, helps automate workflows. Healthcare organizations are using Palo Alto Networks products to secure the devices that deliver cutting-edge care to millions of patients all over the world. "Establishing and maintaining acute situational awareness of the Internet of Medical Things (IoMT) environment is paramount to establishing an effective enterprise cybersecurity program. The ability to accurately detect, identify and respond to cyber threats is critical to ensuring minimal operational impact to clinical operations during a cyber event," said Tony Lakin, CISO, Moffitt Cancer Center. "Palo Alto Networks IoT capability seamlessly integrates with our continuous monitoring processes and threat-hunting operations. The platform consistently provides my teams with actionable information to allow them to proactively manage the threat surface of our medical device portfolio." "With thousands of devices to manage, healthcare environments are extremely complex and require intelligent security solutions capable of doing more. Palo Alto Networks understands this requirement and is leveraging machine learning (ML) for Medical IoT security. Adding intelligence will enable providers to improve operational efficiency, which will enhance patient and practitioner experience and alleviate the burden of an ongoing IT skills shortage," said Bob Laliberte, principal analyst, ESG. "Healthcare providers continue to be high-value targets for attackers. This reality, combined with the diversity of medical IoT devices and their inherent vulnerabilities, points to a real need for device security that is purpose-built for healthcare use cases. The ability to defend against threats targeting critical care devices while maintaining operational availability and strengthening the alignment of device governance responsibilities between IT and Biomed engineering teams is quickly becoming a necessity for the protection of patient data and lives," said Ed Lee, research director, IoT and Intelligent Edge Security, IDC. About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Elektrobit and Argus Cyber Security announce industry-first automotive switch firmware pre-integrated with cyber security functionality

Elektrobit | September 15, 2022

Elektrobit, a visionary global vendor of software products for the automotive industry, and Argus Cyber Security, a world leader in cyber security products and services for mobility platforms, today announced the launch of EB zoneo SwitchCore Shield, an industry-first pre-integrated solution of embedded intrusion detection and prevention (IDPS) functionality within advanced network management systems for next-generation vehicles. The joint solution is an automotive-grade switch firmware for E/E architectures that pre-integrates Argus Ethernet IDPS, a cyber security protection layer for automotive Ethernet networks, as an embedded module. This production-ready solution reduces carmakers' integration costs and risks while accelerating new vehicles' time to market. Building upon decades of automotive expertise from Elektrobit and Argus, this breakthrough solution allows carmakers to evaluate data detected and quickly determine actions required to confront an attempted cyber-attack. Adding a layer of intelligence and cyber protection to automotive Ethernet switches, facilitates the management of the growing number of network functions required to enhance the scalability, safety, and security of vehicles. By offloading network and cyber-related tasks to the switch firmware, it optimizes the microcontroller unit's computational resource consumption. EB zoneo SwitchCore Shield also enables carmakers to comply with emerging cyber security regulations, such as UN R155 and Chinese GB/T, and also takes security a step further, providing an additional layer of threat prevention via Argus Ethernet IDPS for increased interoperability with Classic AUTOSAR systems. "We developed EB zoneo SwitchCore Shield to fill the gap between the cyber security domain and the advanced networking needed for next-gen, software-defined vehicles. "We're helping carmakers to save time and money by providing a pre-integrated solution built to meet the highest levels of safety and security regulations." Mike Robertson, head of product and strategy management, Elektrobit About Elektrobit Elektrobit is an award-winning and visionary global vendor of software products and services for the automotive industry. A leader in automotive software with over 35 years serving the industry, Elektrobit's software powers over five billion devices in more than 600 million vehicles and offers flexible, innovative solutions for car infrastructure software, connectivity & security, automated driving and related tools, and user experience. Elektrobit is a wholly-owned, independently-operated subsidiary of Continental. About Argus Cyber Security Argus is a global leader in cyber security for connected mobility, providing products and services for embedded automotive systems and backend, fleet-level security functions. Founded in 2014, Argus is headquartered in Tel Aviv, Israel, with offices in Michigan, Stuttgart, Paris, Tokyo, and Seoul. Argus is an independent subsidiary of Elektrobit, a leading provider of automotive software products and services.

Read More