Overview

“Full Visibility, Full Control in OT (ICS) Security.”

With the advent of Industry 4.0, OT devices began integrating with SCADA and ERP systems, bringing the need for continuous data exchange and remote access. This data flow—enabled by IoT and IIoT equipment, sensors, and industrial protocols—increases efficiency in smart factories while simultaneously amplifying cybersecurity risks.

Honeywell Forge Cyber Security is a comprehensive platform that delivers end-to-end visibility, asset management, secure integration, and advanced threat detection. With centralized management, advanced analytics, and a scalable architecture, it ensures the security of SCADA systems—enabling operations to run continuously, securely, and in compliance with standards.

Thus, enterprises can confidently continue their digital transformation journey while enhancing both business continuity and operational efficiency

Honeywell Forge Cyber Security+
Video Thumbnail
Video Thumbnail
Video Thumbnail

Products

Full Visibility and Security Against Cyber Threats in Industrial Networks with Passive NDR and IDS


"Security and Visibility for Critical Infrastructures"

In today's increasingly complex energy, industrial, and building automation networks, visibility and security are more critical than ever. Honeywell Cyber Insights provides powerful protection for your OT environments and SCADA infrastructures by monitoring them almost in real-time, including asset discovery, vulnerability management, and detection of malicious activities. Thanks to its open and flexible architecture, it offers seamless integration with your existing process control systems, SCADA solutions, and building management technologies. This enables end-to-end visibility, reduces risks, ensures operational continuity, and secures your critical infrastructures for the future. Additionally, with advanced cybersecurity intelligence capabilities, it employs the "Passive NDR" (Network Detection and Response) approach to perform real-time, in-depth analysis, reduce the threat surface, and provide proactive security.

Visibility and Analysis: Cyber Insights automatically discovers all assets in your OT networks, inventories them, and makes them visible with detailed network maps. Abnormal network activities, unauthorized access, and vulnerabilities are quickly detected, allowing operational risks to be identified in advance.

Risk Mitigation: Asset risk scores, CVSS, and known vulnerabilities (CVE / KEV) are correlated to prioritize the most critical threats. Automated security reports, risk analysis, and threat assessment views accelerate decision-making and strengthen your security posture.

Operational Efficiency: Provides deep visibility into industrial commands and suspicious communications. With SIEM and SOAR integration, alert management is simplified, and sensorless deployment support offers cost-effective remote monitoring options.

AI-Driven Detection and Response: AI-powered threat detection increases security with high accuracy and low false positives. Malicious software, abnormal traffic, and unauthorized OT commands are detected, visibility is provided, and security teams are quickly notified.

Flexible and Scalable Architecture: With RBAC support, it assigns specific access rights to different users and departments. Smart sensors are optimized for low bandwidth, and distributed processing ensures that data is analyzed locally, with only summaries and necessary results transmitted to the center. This reduces bandwidth usage, decreases delays, and ensures the system continues to operate reliably and sustainably at any scale.

Compliance and Reporting: Continuous monitoring of compliance with regulations and industry standards is facilitated with compliance measurement capabilities. Automated reports transparently present security vulnerabilities, risk levels, and remediation recommendations across the organization.


CYBER INSIGHTS

"Global Cybersecurity Visibility"

Honeywell Cyber Watch is designed to allow organizations to track their cybersecurity profiles globally. It provides comprehensive visibility and management through two different portals:

Multi-Site Portal: Provides visibility into cyber threats across multiple facilities. Supports hundreds of different locations through a central platform. It consolidates all asset inventory, traffic, and alert data, among other information collected from the facilities, into a single central location.

Governance Portal: Allows IT and audit departments to centrally define and monitor compliance with organizational policies. It supports OT standards and regulations (such as IEC 62443, NIST frameworks). Ensures compliance with internal policies; facilitates the implementation of common rules across facilities with best practices.


CYBER WATCH

"Honeywell Cyber Watch Governance Dashboard"

Honeywell Cyber Watch Governance is a powerful solution that enables organizations to centrally manage their OT cybersecurity policies and compliance statuses based on real data. This structure, designed specifically for CISOs and security leaders, allows for compliance reporting and measurement using up-to-date, real-time data obtained from networks.

The Governance Dashboard not only tracks compliance but also enables organizations to manage their cybersecurity strategies with data-driven decisions and take proactive measures against global threats.

Central Governance: Designed to remotely and continuously monitor the compliance of your fields with industry standards such as EPDK, NIS2, OTCC, SOCI, IEC 62443, NERC CIP, NIST, ISO 27001, and corporate policies.


CYBER WATCH GOVERNANCE

"Highest Security Standard for Remote Access to Critical Facilities"

Honeywell Secure Remote Access ensures that only authorized personnel have access to process control systems, preserving data confidentiality and operational continuity. With a multi-layered security approach, it provides authentication, encryption, logging, and role-based authorization. Honeywell Secure Remote Access offers maximum security, flexibility, and operational efficiency for remote access to your facilities, meeting modern industrial security standards.

End-to-End Security: AES-256 encryption, two-factor authentication, and role-based authorization ensure that only the right person accesses critical systems at the right time.

Full Traceability: All access and security logs are retained for 180 days, ensuring transparency during audits.

Easy Management: Centralized server management simplifies monitoring and updating, while firewall configurations are streamlined.

Flexible Access Models: Supports different needs with options for one-time sessions (Session-Based), persistent agent-based access (Agent-Based), and temporary access (Host/Guest Pass).

Operational Efficiency: Multiple users can connect to the same session, solving problems faster and supporting continuous operation of the facilities.


SECURE REMOTE ACCESS (SRA)

"Protect Your Industrial Facilities from Cyber Threats Arising from USB and Removable Media Usage"

Honeywell SMX provides a corporate-level solution that reduces cybersecurity risks and operational disruptions by monitoring and logging removable media activities. Air-gapped systems offer scalable visibility and management across remote sites and multiple facilities.

Prevents Cyber Threats: Detects and blocks malicious software before USB devices can access critical infrastructure.

Secure Field Use: SMX Portable Scanner safely scans USB devices, even on systems with no internet access.

Continuous Protection Updates: Always stays up-to-date with the latest EKS threat intelligence provided by Honeywell’s GARD threat research team.

Compliance and Transparency: Complies with EPDK, ISA-99, IEC 62443, and NIST standards. Facilitates compliance audits by logging media activities.

Operational Continuity: Instead of banning USB usage, it secures it, ensuring both security and business continuity.


SECURE MEDIA EXCHANGE (SMX)

Why Honeywell Forge Cyber Security+?

Cybersecurity Platform for Your Critical IT & OT Infrastructure

In today’s complex industrial ecosystems, ensuring uninterrupted and secure operation of IT and OT networks is vital—not only for maintaining production continuity but also for protecting corporate reputation and data integrity. The Honeywell Forge | Cyber Security+ platform continuously monitors your OT network without disrupting existing operations, discovers all assets, maps OT communication in detail, and provides complete visibility into your entire network traffic.

Through deep packet inspection, anomaly detection, advanced risk identification, and incident response capabilities, threats are detected before they can cause any impact. With its user-friendly interface, the platform bridges IT and OT teams, accelerating operational decision-making processes.

Being Proactive To Ensure Continuous Protection Of The Production Facility

Industrial facilities must now defend not only against physical threats but also against ever-evolving cyber threats. Reactive solutions alone are not sufficient to prevent production line interruptions; a proactive approach is essential. A security platform capable of recognizing and interpreting OT protocols while enabling bidirectional integration between IT and OT becomes a critical necessity at this point. 

The proactive security approach detects potential anomalies and threats in your network before they occur, ensuring both production efficiency and facility safety. During modernization, it strengthens your facility’s digital infrastructure while bridging the gap between IT and OT domains, preparing your operations for the future.

IT Solutions Are Ineffective In OT, While IIoTs Increase OT Network Risk

Traditional IT solutions remain limited in industrial environments because they do not recognize the unique structure of OT networks, their communication protocols, and the dynamic nature of production environments. When the large amounts of data collected from the field through IIoT sensors are not protected with proper security layers, OT networks become attractive targets for cyberattacks. Especially when low-security OT systems are compromised, the spread of malicious content becomes much faster and its impact far more destructive.

At this point, security solutions specifically designed for OT come into play instead of conventional IT tools. These solutions recognize OT-specific protocols, reduce the attack surface, and prevent the spread of threats. In this way, businesses protect not only their data integrity, but also their operational safety, production quality, and customer satisfaction.

The Need For Segmentation And Continuous OT Network Traffic Analysis

One of the most critical aspects of cybersecurity is network segmentation and continuous traffic analysis. Especially in OT environments, advanced monitoring and analysis performed at Levels 0/1/2 enable threats to become visible from the very first day. This eliminates blind spots and allows you to maintain full control over your systems.

Segmentation creates an effective line of defense by preventing attacks from spreading from one part of the network to another. Continuous traffic analysis, on the other hand, not only identifies existing threats but also anticipates potential risks, enabling proactive measures to be taken.

In this way, a solid foundation is established in your OT networks for business continuity, uninterrupted production, and secure digitalization. To confidently shape the future of your enterprise, segmentation and traffic analysis should be regarded not as an option, but as a strategic necessity.

Flexible Deployment Options

Honeywell Forge offers flexible deployment options designed to meet the needs of industrial facilities of all sizes. Through software, hardware, smart sensors, virtual machines (VM), and cloud-based solutions, it integrates seamlessly into your existing infrastructure with minimal intervention. 

Cyber Insights sensors collect traffic data from different segments of the OT network, analyze OT protocols, and provide deep visibility across the entire network. The collected data is centrally managed through the Cyber Insights and Cyber Watch modules. 

Thanks to this architecture, your facilities can be managed centrally from a single point, risks can be identified early through real-time analysis, and its easily scalable structure allows for the addition of new sensors, segments, or cloud integrations. Moreover, seamless IT and OT alignment ensures smooth integration with SoC and SIEM systems.

Advantages

Proactive Defense, Uninterrupted Production

Monitor SCADA And OT Systems 24/7

Make Your OT Network Fully Visible

Solution Benefits

Digitalize all your assets in the OT environment with automated asset discovery and network mapping technologies. Replace manually prepared and rapidly outdated tables with a real-time, continuously updated inventory. This way, you can monitor all your devices’ types, locations, software versions, and security statuses from a single platform, managing your operations under complete visibility.
Analyze existing vulnerabilities and potential attack scenarios in your OT network in advance to build a comprehensive risk profile. This allows you to foresee not only which points are exposed to threats but also how attacks could impact your critical production processes. Based on the obtained insights, strategically define proactive measures to reduce the attack surface, increase network resilience, and ensure operational continuity.
Monitor your SCADA and OT systems 24/7 to keep your security posture current and accurate. Through real-time event tracking, immediately detect anomalies, unauthorized access attempts, and threats. Continuous monitoring of traffic, device behaviors, and inter-system communications ensures full control over your most critical business assets. This not only eliminates risks but also simplifies compliance reporting and strengthens your security teams’ incident response capabilities.
Honeywell Forge | Cyber Security+ integrates seamlessly with your existing SoC and SIEM infrastructures. Thus, all security events occurring in the OT environment are included in the IT workflow and managed under a unified structure. Whether handled by your in-house teams or your MSSP provider, unified visibility and standardized processes accelerate incident response, creating a coordinated and robust defense mechanism against threats.
Don’t just identify vulnerabilities in IT and OT environments—prioritize them based on their impact on business continuity. This way, security teams avoid wasting time on low-impact issues and focus resources on the most critical risks. Prioritization ensures effective patch planning, policy updates, and rapid response to urgent vulnerabilities.
Identify any abnormal behavior, misconfiguration, or unexpected change that threatens operational continuity before it manifests. Honeywell Forge | Cyber Security+ monitors the performance and traffic of all devices within the OT network, alerting you proactively. This not only enhances security but also improves operational stability, prevents unexpected downtime, and makes maintenance processes predictable.
As the first OT security platform integrating the MITRE ATTACK framework for Industrial Control Systems, Honeywell Forge clearly identifies the techniques used by threat actors. This enables faster detection of attack methods, prediction of future threats, and development of proactive defense strategies. MITRE ATTACK compliance enhances detection accuracy and accelerates incident response.
Detect ransomware, malware, and advanced persistent threats (APT) at an early stage. Through continuous monitoring and advanced threat detection mechanisms, malicious activities are stopped before causing permanent damage to systems. Early detection ensures operational continuity, reduced maintenance costs, and a more resilient infrastructure against future attacks.
Join the Honeywell Forge Network

For the Latest Innovations in Critical Infrastructure, ICS, and Remote Access