/content/process/us/en/search.html

Cyber Suite

Honeywell SMX

SMX is a system designed to enable the use of removable storage media (thumb drives, flash drives, portable hard drives, CD/DVDs, SD Cards etc.) while at the same time improving the protection of critical environments against the threat of malware.

Overview
How does Honeywell Secure Media Exchange (SMX) work?
The SMX gateway security device simply resides in your physical “front desk” or a site location of your choice. A consumer-driven touch screen (which works even with gloves on) intuitively prompts visitors to insert their removable media as part of the check-in procedure. Detection of malware and other security threats is improved before they can be transmitted by USBs to critical infrastructure in the facility.
Upon visitor or employee check-out, SMX checks the device again for anomalies and later supports forensics by logging device information.

Does Honeywell SMX have customized data collection capabilities?
Yes. Honeywell SMX is customized during deployment to meet each specific site's needs for data collection and information access.

What is Honeywell Cyber Threat Intelligence and how do customers benefit?
Cyber Threat Intel is designed to include the following capabilities, features, and enhancements:
  • File upload and Advanced malware analysis capabilities
  • Contextual analysis and threat information
  • IOC (Indicator of Compromise) reputation and enrichment
  • Adversary Tactics and Techniques Detection (ATTD)
  • Executive and detailed reports
  • Integrated dashboard for threat insights
  • Integration with Honeywell and third-party SOC/SIEM/SOAR tools to automate analysis
  • Identification and prioritization of threats
What is Honeywell Cyber Threat Intelligence and how can it help my enterprise?
Honeywell's Cyber Threat Team is dedicated to OT-focused cybersecurity research, innovation, and integration. As a part of Honeywell’s cybersecurity solution, the Cyber Threat Team leverages data curated from 7 Honeywell cybersecurity research centers to provide OT threat analysis and threat detection.
Name
Description
File Size
Date
Size
No support documents tagged to this product
An error occurred . Please try after sometime
Part Number
Description
Leaf Category
Thumbnail
Add to list