SlideShare a Scribd company logo
1 of 8
Technology Snapshots
Honeywell Cybersecurity
October 24, 2017
What is the problem?
• Cybersecurity attacks pose significant and persistent
threat to network systems
• Windows monitoring and log data is insufficient
– Not focused on computer security / incident response
– Mostly auditing without context
• No native log transport to non-Windows servers
• Logs do not contain information critical for computer
security
– Hashes, file metadata
• Need forensic analysis that is fast, active in real time
How does product/service solve problem?
• Windows Logging Service (WLS) provides enhanced
operating system information via standard syslog
messages to any compatible log server
• Developed at Honeywell Federal Manufacturing &
Technologies, WLS augments traditional logging and
forensic analysis
– Real-time reporting of contextual operating system (OS)
information
– Increased logging capability
• Highly customizable
– Supports many log formats, including custom
– All features can be enabled / disabled / tuned
• Compatible from Windows XP/2003 and up
What is the market use?
• WLS reads and sends all Windows event logs and adds extra
data relevant to cyber security, such as cryptographic hashes
and file metadata.
• WLS provides this data in real-time and in context with
process information
– allows for correlation of previously ambiguous data points and gives
insight into OS and process interactions.
• Any business running Windows systems that needs more
insight for computer security or IT information
• Current customers and evaluators include federal and state
government agencies and offices, large and small industry,
and universities and individuals.
• Honeywell would like to license WLS to an intermediary, who
would handle all downstream commercialization efforts.
What competition exists?
• A few commercial competitors exist
• Paid tools are typically proprietary
• Proprietary tools
– Splunk (closed format)
• Free tools
– Nxlog (less features)
– Snare (less features)
• Partial competitors
– Sysmon (no transport, less features)
• None of these individual systems protect against all
cyber threats, nor does the combination of all of these
programs offer a full range of cybersecurity protection
What is the status of the intellectual property?
• WLS is an existing product with over 50 full licenses
sold to customers ranging from large national
laboratories, public utilities, and large and small
companies
• Asserted DOE copyright
What is the stage of development?
• WLS has been validated by our customers, who
require some of the highest levels of cybersecurity in
the world
– Federal agencies, defense or security-based commercial
users
• 7 years of development
• Commercialization effort has been word-of-mouth
• WLS is in version 3.5 with updates released about
every 6 months
What is needed for further development?
• Currently, customers contact Honeywell Federal
Manufacturing & Technologies to license object code
only
– Requires significant effort from Honeywell Federal
Manufacturing & Technologies staff
• Identify licensee who can assume marketing, sales,
and customer facing efforts.
• Licensee would also handle quality assurance and
would communicate customer feedback to Honeywell
Federal Manufacturing & Technologies, who would
continue to support future WLS development.

More Related Content

What's hot

Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
Robert D. Williams
 

What's hot (19)

IT Hosting Benefits
IT Hosting BenefitsIT Hosting Benefits
IT Hosting Benefits
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and Data
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
Panda Security - Systems Management
Panda Security - Systems ManagementPanda Security - Systems Management
Panda Security - Systems Management
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
 
Cybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationCybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentation
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 

Similar to Honeywell Cybersecurity

Resume-John-Whitney
Resume-John-WhitneyResume-John-Whitney
Resume-John-Whitney
John Whitney
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
SplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow JonesSplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow Jones
Splunk
 

Similar to Honeywell Cybersecurity (20)

PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxCyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptx
 
Riscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glanceRiscure Assurance for Premium Content at a glance
Riscure Assurance for Premium Content at a glance
 
C days2015
C days2015C days2015
C days2015
 
Resume-John-Whitney
Resume-John-WhitneyResume-John-Whitney
Resume-John-Whitney
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Single Source of Truth in a Distributed World by Sven Erik Knop
Single Source of Truth in a Distributed World by Sven Erik KnopSingle Source of Truth in a Distributed World by Sven Erik Knop
Single Source of Truth in a Distributed World by Sven Erik Knop
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
SplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow JonesSplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow Jones
 

More from kphodel

More from kphodel (20)

Antiviral Compounds Against SARS-COV-2
Antiviral Compounds Against SARS-COV-2Antiviral Compounds Against SARS-COV-2
Antiviral Compounds Against SARS-COV-2
 
Co-Immunity Presentation
Co-Immunity PresentationCo-Immunity Presentation
Co-Immunity Presentation
 
Co-Immunity Presentation
Co-Immunity PresentationCo-Immunity Presentation
Co-Immunity Presentation
 
Effective, Disposable Medical Gowns
Effective, Disposable Medical GownsEffective, Disposable Medical Gowns
Effective, Disposable Medical Gowns
 
Improved Jacketing Repair System For Steel H Beams
Improved Jacketing Repair System For Steel H Beams Improved Jacketing Repair System For Steel H Beams
Improved Jacketing Repair System For Steel H Beams
 
Nucleotide-Based Diagnostic for Infectious Diseases
Nucleotide-Based Diagnostic for Infectious DiseasesNucleotide-Based Diagnostic for Infectious Diseases
Nucleotide-Based Diagnostic for Infectious Diseases
 
Non-Invasive Bowel monitoring system
Non-Invasive Bowel monitoring systemNon-Invasive Bowel monitoring system
Non-Invasive Bowel monitoring system
 
Securing edge lot systems
Securing edge lot systemsSecuring edge lot systems
Securing edge lot systems
 
Pandemic tent
Pandemic tentPandemic tent
Pandemic tent
 
Therapeutic Targeting of Alzheimer's Disease with a Selective Antibody
Therapeutic Targeting of Alzheimer's Disease with a Selective AntibodyTherapeutic Targeting of Alzheimer's Disease with a Selective Antibody
Therapeutic Targeting of Alzheimer's Disease with a Selective Antibody
 
Non-Resistant Antimicrobial Therapy: Treating Superbugs That Cause Nosocomial...
Non-Resistant Antimicrobial Therapy: Treating Superbugs That Cause Nosocomial...Non-Resistant Antimicrobial Therapy: Treating Superbugs That Cause Nosocomial...
Non-Resistant Antimicrobial Therapy: Treating Superbugs That Cause Nosocomial...
 
Dual function camera webinar presentation for webpage
Dual function camera webinar presentation for webpageDual function camera webinar presentation for webpage
Dual function camera webinar presentation for webpage
 
Dual function camera webinar presentation
Dual function camera webinar presentationDual function camera webinar presentation
Dual function camera webinar presentation
 
4.23.2020 webinar presentation for website
4.23.2020 webinar presentation for website4.23.2020 webinar presentation for website
4.23.2020 webinar presentation for website
 
4.23.2020 W2B Webinar Presentation
4.23.2020 W2B Webinar Presentation4.23.2020 W2B Webinar Presentation
4.23.2020 W2B Webinar Presentation
 
Mizzou bio joint flex snapshot
Mizzou bio joint flex snapshotMizzou bio joint flex snapshot
Mizzou bio joint flex snapshot
 
W2B High Scurity Circuit Boards
W2B High Scurity Circuit BoardsW2B High Scurity Circuit Boards
W2B High Scurity Circuit Boards
 
W2B Electromagnetic Launchers
W2B Electromagnetic LaunchersW2B Electromagnetic Launchers
W2B Electromagnetic Launchers
 
Ergo stm snapshot 3.26
Ergo stm snapshot 3.26Ergo stm snapshot 3.26
Ergo stm snapshot 3.26
 
Snap shot lever 2019 website version
Snap shot   lever 2019 website versionSnap shot   lever 2019 website version
Snap shot lever 2019 website version
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Honeywell Cybersecurity

  • 2. What is the problem? • Cybersecurity attacks pose significant and persistent threat to network systems • Windows monitoring and log data is insufficient – Not focused on computer security / incident response – Mostly auditing without context • No native log transport to non-Windows servers • Logs do not contain information critical for computer security – Hashes, file metadata • Need forensic analysis that is fast, active in real time
  • 3. How does product/service solve problem? • Windows Logging Service (WLS) provides enhanced operating system information via standard syslog messages to any compatible log server • Developed at Honeywell Federal Manufacturing & Technologies, WLS augments traditional logging and forensic analysis – Real-time reporting of contextual operating system (OS) information – Increased logging capability • Highly customizable – Supports many log formats, including custom – All features can be enabled / disabled / tuned • Compatible from Windows XP/2003 and up
  • 4. What is the market use? • WLS reads and sends all Windows event logs and adds extra data relevant to cyber security, such as cryptographic hashes and file metadata. • WLS provides this data in real-time and in context with process information – allows for correlation of previously ambiguous data points and gives insight into OS and process interactions. • Any business running Windows systems that needs more insight for computer security or IT information • Current customers and evaluators include federal and state government agencies and offices, large and small industry, and universities and individuals. • Honeywell would like to license WLS to an intermediary, who would handle all downstream commercialization efforts.
  • 5. What competition exists? • A few commercial competitors exist • Paid tools are typically proprietary • Proprietary tools – Splunk (closed format) • Free tools – Nxlog (less features) – Snare (less features) • Partial competitors – Sysmon (no transport, less features) • None of these individual systems protect against all cyber threats, nor does the combination of all of these programs offer a full range of cybersecurity protection
  • 6. What is the status of the intellectual property? • WLS is an existing product with over 50 full licenses sold to customers ranging from large national laboratories, public utilities, and large and small companies • Asserted DOE copyright
  • 7. What is the stage of development? • WLS has been validated by our customers, who require some of the highest levels of cybersecurity in the world – Federal agencies, defense or security-based commercial users • 7 years of development • Commercialization effort has been word-of-mouth • WLS is in version 3.5 with updates released about every 6 months
  • 8. What is needed for further development? • Currently, customers contact Honeywell Federal Manufacturing & Technologies to license object code only – Requires significant effort from Honeywell Federal Manufacturing & Technologies staff • Identify licensee who can assume marketing, sales, and customer facing efforts. • Licensee would also handle quality assurance and would communicate customer feedback to Honeywell Federal Manufacturing & Technologies, who would continue to support future WLS development.