Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Forcepoint Launches Critical Infrastructure Business Unit

Raytheon-owned cybersecurity solutions provider Forcepoint on Thursday announced the launch of a new business unit focusing on critical infrastructure.

Raytheon-owned cybersecurity solutions provider Forcepoint on Thursday announced the launch of a new business unit focusing on critical infrastructure.

The new unit will be led by David Hatchell, who has been named vice president of Critical Infrastructure. Hatchell, who previously led critical infrastructure units at Belden and Intel/McAfee, will report to Sean Berg, senior vice president and general manager for Forcepoint’s Global Governments and Critical Infrastructure business.

Forcepoint launches ICS/critical infrastructure offering

The initial focus is on securing the industrial control systems (ICS) used by organizations in the energy, oil and gas, critical manufacturing and other critical infrastructure sectors.

Specifically, Forcepoint will deliver integrated behavior-based security products adapted for industrial environments, particularly solutions designed to provide more visibility into the potential threats facing ICS.

The company promises to provide solutions for secure segmentation where remote access is required, and a baseline for monitoring industrial environments for threats. The solutions are advertised as being in compliance with standards such as ISA/IEC 62443, NEI-08-09, and NERC-CIP.

Some of these capabilities will be powered by Forcepoint NGFW, a product designed to detect exploitation attempts, block malware, and defeat evasion techniques across physical, virtual and cloud systems. Forcepoint NGFW can quickly scan encrypted traffic while providing granular privacy controls, the company said.

Another product offered to critical infrastructure organizations is Forcepoint Data Guard, which validates data transfers between OT and IT networks to ensure that only commands and data sets required for operations are allowed.

“Leveraging defense-grade approaches which are used by top government agencies, customers can deploy a variety of solutions for highly sensitive areas like nuclear and power generation, or meet simple DMZ and remote access requirements,” Hatchell wrote in a blog post. “Furthermore, the Forcepoint pedigree of understanding insider threats, or how actors behave once inside an environment to compromise system operations, gives us a unique viewpoint to address ICS challenges where they are most vulnerable—the human point of interaction with systems and data.”

Advertisement. Scroll to continue reading.

Related: Forcepoint Acquires Skyfence from Imperva

Related: Microsoft Unveils New Solution for Securing Critical Infrastructure

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...