Security Experts:

Connect with us

Hi, what are you looking for?



Forcepoint Launches Critical Infrastructure Business Unit

Raytheon-owned cybersecurity solutions provider Forcepoint on Thursday announced the launch of a new business unit focusing on critical infrastructure.

Raytheon-owned cybersecurity solutions provider Forcepoint on Thursday announced the launch of a new business unit focusing on critical infrastructure.

The new unit will be led by David Hatchell, who has been named vice president of Critical Infrastructure. Hatchell, who previously led critical infrastructure units at Belden and Intel/McAfee, will report to Sean Berg, senior vice president and general manager for Forcepoint’s Global Governments and Critical Infrastructure business.

Forcepoint launches ICS/critical infrastructure offering

The initial focus is on securing the industrial control systems (ICS) used by organizations in the energy, oil and gas, critical manufacturing and other critical infrastructure sectors.

Specifically, Forcepoint will deliver integrated behavior-based security products adapted for industrial environments, particularly solutions designed to provide more visibility into the potential threats facing ICS.

The company promises to provide solutions for secure segmentation where remote access is required, and a baseline for monitoring industrial environments for threats. The solutions are advertised as being in compliance with standards such as ISA/IEC 62443, NEI-08-09, and NERC-CIP.

Some of these capabilities will be powered by Forcepoint NGFW, a product designed to detect exploitation attempts, block malware, and defeat evasion techniques across physical, virtual and cloud systems. Forcepoint NGFW can quickly scan encrypted traffic while providing granular privacy controls, the company said.

Another product offered to critical infrastructure organizations is Forcepoint Data Guard, which validates data transfers between OT and IT networks to ensure that only commands and data sets required for operations are allowed.

“Leveraging defense-grade approaches which are used by top government agencies, customers can deploy a variety of solutions for highly sensitive areas like nuclear and power generation, or meet simple DMZ and remote access requirements,” Hatchell wrote in a blog post. “Furthermore, the Forcepoint pedigree of understanding insider threats, or how actors behave once inside an environment to compromise system operations, gives us a unique viewpoint to address ICS challenges where they are most vulnerable—the human point of interaction with systems and data.”

Related: Forcepoint Acquires Skyfence from Imperva

Related: Microsoft Unveils New Solution for Securing Critical Infrastructure

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.