/content/hbtbt/us/en/search-results.html
    honeywell-homepage-cybersecurity.jpg
    honeywell-homepage-cybersecurity.jpg

    Cybersecurity is built in. Not added on.

    At every step of our Secure Software Development Lifecycle, we’re assessing the risk environment a product might face. We work to identify the privacy impact and anticipate vulnerabilities, then harden our products accordingly. Finally, when all our security leads approve, we think you will, too.

    Intruders are relentless. So is our pursuit of security.

    Hackers won’t stop looking for weaknesses. So neither will we. We’re constantly scrutinizing our products for a possible entry point. That way, we can better identify and address issues ahead of time. Hackers want a way in. We’re working to keep them out.
    CYBERSECURITY TEAM

    Our team wants your team to win.

    The experts on our product cybersecurity team have more than 135+ years of collective experience. They’re embedded into our product development teams so that, at every stage, security and privacy are designed into our products. This is just one of the many ways we incorporate security into our SDLC and drive the maturity of our program. We want your confidence that the products you buy from us thoughtfully incorporate security and are vigorously tested to be secure. That’s a win for us.

    GLOBAL ACHIEVEMENTS

    We’re a member of ISA GCA. We’re also a founder.

    We helped found the ISA Global Cybersecurity Alliance (GCA) to educate, build awareness, share best practices and accelerate the development and adoption of cybersecurity standards. We invest in the growth and training of our team through third party certifications like, CCSP, CISSP, CSSLP and CISM as well as through industry organizations.

    DATA PRIVACY

    Your data is private property. Trespassers aren’t allowed.

    When you take data privacy as seriously as we do, security and privacy best practices drive every process we institute, every product we create, and every piece of software we deploy. We carefully follow the General Data Protection Regulation as well as all other applicable industry regulations and statutes. It starts when a product is on the drawing board. And it continues throughout the product’s lifetime.

    CONNECTED PRODUCTS

    Connected products have benefits. And risks.

    The same products that make a building more agile can also make it more vulnerable. Those risks, along with a changing cybersecurity landscape, require a company that isn’t content with making you secure today. We want to keep you safer in the future. That’s why we are constantly researching the latest trends in cybersecurity, like securing a workforce that’s working in isolation, but still connected to your network. Cyberattack attempts aren’t going away. And neither are we.

    OPERATIONAL TECHNOLOGY

    OT could be an entry point. Lock the door.

    Typically, IT gets all the cybersecurity attention. But the systems that control and protect processes, equipment and operations--your Operational Technology—have also become attractive to hackers, as have integrated facilities because of the prevalence of connected devices. It’s important that cybersecurity, including OT, is built in across an entire enterprise like we do at Honeywell. If there ever is an issue, we have a Product Incidence Response Team that will manage it in accordance with our high standards to help solve the issue and provide transparency.

    Take comfort knowing your systems are more secure.

    Breaches, hacks, malware — we understand how much they concern you. It’s why we incorporate cybersecurity and privacy features into the processes, products and software we develop. Learn more about the products that can help make your building smarter and safer.