Login
    
 
Cyber Protection from Tyco Security Products - Holistic Methodology... policy governed, expert driven
 
 
Overview Technical Resources In The News  Compliance Guidelines  Security Advisories Register
 
 

Johnson Controls' approach to cyber protection is aimed at providing peace of mind to our customers. Our holistic cyber mindset begins at initial design concept, continues through product development, and is supported through deployment, including a rapid incident response to meet the comprehensive and evolving cybersecurity environments. Our methods include the ability to provide cyber resilient systems with a range of capabilities to complement the diverse security needs of our customers.

We have invested in establishing a centralized dedicated Global Product Security team that is focused on managing our cyber practices with governance to enforce compliance. At Johnson Controls, we are disciplined in executing these as we understand what is at risk if we don't.

 
 

HOLLISTIC METHODOLOGY
Governed by Policies and Supported by a Dedicated Global Product Security Team


Secure Development
Baseline design requirements that address core cyber threat categories for elevated security Dedicated in-house cybersecurity test labs focused on discovering and neutralizing concerns before they reach customers Extended testing, including bug bounty programs and 3rd party penetration testing, provides verification and validation assurance Solution designed features that enable easier compliance with corporate policies Certified and trained experts driving design decisions


Deployment Services
Customer education to help drive more secure installation Thought leadership to build a pragmatic approach to address cyber risk Compliance assistance to help you comply with industry and organizational policies Security documentation for IT acceptance


Rapid Response
Rapid incident response to quickly respond and advise on vulnerabilities Preemption solutions driven by ongoing threat and trend monitoring Incident response designed in conformance with ISO standards for accurate and consistent vulnerability handling and disclosure


Disruption is Not an Option Disruption is Not an Option
Operational technologies often provide critical functions which, if disrupted, can impact operational efficiency and profits and result in disclosure of sensitive information. Cyber-attackers whose aim is to cause disruption and loss have identified building and security systems as attractive targets. In today's environment, cybersecurity plays a very crucial role in protecting building and security systems. Unfortunately, many system providers do not address cybersecurity or fall short of providing sufficient support, leaving many buildings under protected.
 
 
A Higher Level Commitment A Higher Level Commitment
Johnson Controls' approach to cyber protection is aimed at providing peace of mind to our customers. Our holistic cyber mindset begins at initial design concept, continues through product development, and is supported through deployment, including a rapid incident response to meet the comprehensive and evolving cybersecurity environments. Our methods include the ability to provide cyber resilient systems with a range of capabilities to complement the diverse security needs of our customers. We have invested in establishing a centralized dedicated Global Product Security team that is focused on managing our cyber practices with governance to enforce compliance. At Johnson Controls, we are disciplined in executing these as we understand what is at risk if we don't.
 
 
Expert Driven Designs Expert Driven Designs
Having engineering teams trained in cybersecurity has given Johnson Controls an advantage in developing products that consider cybersecurity within its core design. Our certified cybersecurity experts (CISSP, CSSLP, CEH, CCSP etc.) work to validate designs using the latest recognized industry standards and practices. Expert driven cybersecurity designs provide the forethought required to reduce risk.
 
 
Lifecycle Management Lifecycle Management
Our cyber protection approach begins with the design and doesn't stop once a product is developed – a product secure today may not be secure tomorrow. Through the rapid incident response service, our dedicated cybersecurity team quickly assesses new threats and vulnerabilities and advises customers on how they may reduce their cybersecurity exposure.
 
 
Shared Responsibility Shared Responsibility
Since protecting against cyber threats is a shared responsibility, we engage in market facing programs to provide customer engagement, education, and thought leadership to help our customers achieve success in their mission of a more secure system.
 

Products included in the Cyber Protection Program are subject to change without notice at the sole discretion of Tyco Security Products.
Copyright © Tyco 2018. This document contains Tyco proprietary information, as well as publicly available information. Both may be subject to change without notice. All rights reserved. Reproduction or distribution other than for intended purposes is prohibited, without the prior written consent of Tyco. The trademarks and service marks of Tyco, including the Tyco mark and logo and PowerG are the exclusive property of Tyco, and may not be used without permission. All other marks are the property of their respective owners.

 

SiteMap Terms Of Use Privacy Cookies Accessible Service Policy Site Feedback