CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?



Forcepoint Launches Critical Infrastructure Business Unit

Raytheon-owned cybersecurity solutions provider Forcepoint on Thursday announced the launch of a new business unit focusing on critical infrastructure.

Raytheon-owned cybersecurity solutions provider Forcepoint on Thursday announced the launch of a new business unit focusing on critical infrastructure.

The new unit will be led by David Hatchell, who has been named vice president of Critical Infrastructure. Hatchell, who previously led critical infrastructure units at Belden and Intel/McAfee, will report to Sean Berg, senior vice president and general manager for Forcepoint’s Global Governments and Critical Infrastructure business.

Forcepoint launches ICS/critical infrastructure offering

The initial focus is on securing the industrial control systems (ICS) used by organizations in the energy, oil and gas, critical manufacturing and other critical infrastructure sectors.

Specifically, Forcepoint will deliver integrated behavior-based security products adapted for industrial environments, particularly solutions designed to provide more visibility into the potential threats facing ICS.

The company promises to provide solutions for secure segmentation where remote access is required, and a baseline for monitoring industrial environments for threats. The solutions are advertised as being in compliance with standards such as ISA/IEC 62443, NEI-08-09, and NERC-CIP.

Some of these capabilities will be powered by Forcepoint NGFW, a product designed to detect exploitation attempts, block malware, and defeat evasion techniques across physical, virtual and cloud systems. Forcepoint NGFW can quickly scan encrypted traffic while providing granular privacy controls, the company said.

Another product offered to critical infrastructure organizations is Forcepoint Data Guard, which validates data transfers between OT and IT networks to ensure that only commands and data sets required for operations are allowed.

“Leveraging defense-grade approaches which are used by top government agencies, customers can deploy a variety of solutions for highly sensitive areas like nuclear and power generation, or meet simple DMZ and remote access requirements,” Hatchell wrote in a blog post. “Furthermore, the Forcepoint pedigree of understanding insider threats, or how actors behave once inside an environment to compromise system operations, gives us a unique viewpoint to address ICS challenges where they are most vulnerable—the human point of interaction with systems and data.”

Advertisement. Scroll to continue reading.

Related: Forcepoint Acquires Skyfence from Imperva

Related: Microsoft Unveils New Solution for Securing Critical Infrastructure

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem