Forge - Experts & Thought Leaders

Latest Forge news & announcements

Honeywell unveils innovations at ISC West 2025

Honeywell Building Automation is heading to ISC West 2025, taking place March 31-April 4 at the Venetian Expo in Las Vegas, and this year promises to be a true milestone. For the first time, Honeywell is bringing together two of its powerhouse brands—LenelS2 and Honeywell Commercial Security—in a unified presence. Honeywell's latest offerings Honeywell is displaying a wide variety of the latest offerings that blend LenelS2’s access control Honeywell will be stationed at Booth #18059, showcasing a lineup that is both innovative and time-tested. From AI-powered tools to cloud-based solutions, Honeywell is displaying a wide variety of the latest offerings that blend LenelS2’s access control expertise with top-tier portfolios from Commercial Security. Fire and life safety solutions will also be on display. ISC West attendees—ranging from integrators to end-users—will have a front-row seat to learn how these solutions tackle real-world challenges. Few products and offerings Here’s a sneak peek at a few of the products and offerings that will be featured:  Security Management Solutions LenelS2 OnGuard Access Control Solution: Trusted by more than half of the Fortune 100 with extensive breadth and depth of integrations and scalability, it’s powerful, versatile and built to adapt to whatever businesses demand. The latest OnGuard developments focus on enterprise customer experience, extending client capabilities and continued browserisation of clients, expanded FEDGOV and FICAM support and integration with Honeywell’s video solutions. Honeywell Pro-Watch Integrated Security Suite: This enterprise-level solution integrates access control, video surveillance and intrusion detection to help organisations detect and respond to threats sooner, optimise productivity and maintain compliance. The latest features include integrations with BlueDiamond readers and wireless locks, as well as new Mercury MP Series l panels and other installation and deployment improvements.  LenelS2 NetBox Access Control Solution: NetBox is a browser-based plug-and-play solution that seamlessly integrates with video surveillance, alarms and third-party products, software or complex configuration for easy scalability as business needs evolve. NetBox continues to enhance ease-of-use and user experience with expanded video capabilities and integrations, improved reporting and visualisations and future LenelS2 HelpBot integration.  Integrated Cloud Solutions LenelS2 OnGuard Cloud: Delivering the premier enterprise physical access control muscle of OnGuard now via the cloud—scalable, resilient and updated automatically to meet the needs of various dynamically evolving verticals. LenelS2 Elements cloud-based security management solution: A comprehensive and intuitive access control and video management system, designed specifically for the cloud with a flexible, mobile-first and browser-based interface. Recent releases added support for managing multiple sites and vendor integrations, including additional models of wireless locks, video platforms and hardware manufacturers, while also streamlining badge printing and reducing the number of systems needed to support a company’s overall security ecosystem.   Honeywell MAXPRO Cloud: It provides real-time access control and video surveillance on almost any mobile device. It’s perfect for managing one building or an entire campus. Innovation and Emerging Technology BlueDiamond Readers & Mobile Credential Management: Keys? Who needs them? This turns smartphones into touchless access passes with a slick ecosystem that integrates seamlessly with LenelS2 OnGuard, NetBox and Elements platforms and now with Honeywell Pro-Watch to help organisations transition from card-based readers and credentials to mobile-based smartphone credentials as they are ready. One-click credential management is included. Honeywell 35 Series Cameras: Honeywell’s 35 Series of NDAA-compliant cameras offer exceptional picture clarity, flexible system integration, secure data transmission and advanced video analytics with AI insights for everything from small shops to sprawling office, hospitality or enterprise-level facilities. Recent additions include Dual Light Colour cameras that effortlessly switch between infrared and warm light for clear, crisp colour images in extremely low light conditions, pinhole cameras for use in self-checkouts and bank ATMs, 6-12MP Fisheye for monitoring large areas and 5MP Micro Dome with HDMI models for use in retail settings. Honeywell Forge Performance+ for Buildings: This smart solution streamlines visitor management with simplicity, security and compliance at its core. It integrates seamlessly across tools to automate processes, making building operations smoother and more efficient.  LenelS2 HelpBot & Honeywell ProWatch HelpBot: AI is part of these proof-of-concept assistants, designed to help make security operations smoother than ever.   LenelS2 NetBox ReportBot and ControlBot: Another AI-powered duo in development, working to elevate reporting and system control. Visitors can stop by to see these concepts in action.   This is more than just a booth appearance—it’s an opportunity to witness how Honeywell is merging the strengths of its LenelS2 and Commercial Security portfolios to address the security challenges with future technology. How these solutions can elevate security strategies The goal? To spark conversations and show how these tools can fit into any security playbook, from standalone sites to sprawling global networks. The Honeywell team is eager to connect with attendees and demonstrate how these solutions can elevate security strategies for any scale of operation.  Attendees are invited to visit Booth #18059 to explore demos, discuss solutions with Honeywell’s experts and catch a glimpse of some future-forward concepts. 

Defence contractors in unchartered territory: Join American Conference Institute

Defence Contractors are Now in Unchartered Territory. With new DCAA leadership, Executive Orders, and sweeping changes on the horizon, the stakes have never been higher.  Protect the bottom line by joining key stakeholders from defence, aerospace, technology, and beyond at ACI’s 16th Annual DCAA & DCMA Cost, Pricing, Compliance, and Audits—the premier event for cost and pricing, government compliance, audit, and procurement professionals. Senior executives and forge new connections Network with senior executives and forge new connections that can endure well after the conference. This is a pivotal time to expand the sounding board as contractors navigate an uncertain path forward. The conference will feature perspectives from an esteemed government speaker faculty, including: Jennifer Desautel, Director, Defence Contractor Audit Agency John Tenaglia, Principal Director, Defence Pricing and Contract Office of the Secretary of Defence, U.S. Department of Defence Justin Carder, Chief Digital and AI Office, Defence Contractor Audit Agency Use promo code D10-999-SS25 at registration to save an additional 10%!

Helping protect one of Europe's largest manufacturing facilities

Hackers gain control of a chemical plant’s furnace control system. They tamper with the temperature settings and cause an explosion. The consequences of an incident like that can be catastrophic, especially since 9.3 million people reside within a 10-kilometre radius of the average chemical plant in the US. Targeting operational technology (OT) systems has become a typical tactic for bad actors. Cybercriminals and nation-state actors see these critical assets as an open invitation to disrupt operations, cause physical damage and even put public safety at risk. Average cost of Cyber breach OT environments require greater connectivity to realise the advantages of an intelligent production environment. “With increased connectivity comes the increased risk of bad actors gaining access to a network. They want to use it as a launching point to deploy malware and cripple the ability to produce products or provide services,” says Chase Carpenter, Chief Security Officer at Honeywell. Attacks are also costly. According to the Ponemon Institute, the average cost of a cyber breach in critical infrastructure is now $4.5 million. Moreover, 75% of OT organisations experienced at least one intrusion in the past year. OT cybersecurity starts with visibility Unfortunately, the solution didn’t provide the visibility required to efficiently identify cyber threats Honeywell needed to improve security for its own manufacturing environment. Every one of its over 400 facilities depend on OT to function, and in turn, those OT environments depend on cybersecurity programs and solutions to help improve their defences against malware and other cyber attacks that could disrupt or, worse, shut down its manufacturing sites. Before they can implement a good security program for the OT assets, they need to know what they are and where they are. Honeywell started by using an off-the-shelf cybersecurity solution to monitor OT networks at its various manufacturing locations. Unfortunately, the solution didn’t provide the visibility required to efficiently identify cyber threats. Specifically, the tool could not correctly detect numerous network assets, which might vary between workstations, test devices, control systems, CNC devices and more, depending on the manufacturing site. Advantage of the situation Honeywell would have to shut down a factory every time the site was threatened “Over 49% of our assets were left unclassified,” says Mukesh Saseendran, Director of Cybersecurity at Honeywell. “To get an accurate inventory, we needed an individual to walk down to every single workstation and document everything manually, which in itself is labour intensive and prone to human error.” If an asset is undocumented, it’s a blind spot. It could present a gaping hole for attackers to infiltrate, and no one would know about it until it’s too late. Without the right cyber tools in place, Honeywell would have to shut down a factory every time the site was threatened, resulting in serious revenue leakage. “If I don’t know about a particular asset, I can’t protect it and that’s a terrifying scenario,” Carpenter says. “There could be bad actors taking advantage of the situation to stage an attack.” Honeywell taps in-house experience to fight threats Around the same time that Honeywell realised its commercial off-the-shelf solution was inadequate, the company launched its own OT cyber solution. This software solution – Honeywell Forge Cybersecurity+ | Cyber Insights – came from years of internal development in Honeywell’s OT cybersecurity business, which serves multiple industries with products and services designed to help organisations reduce their industrial cybersecurity risk. Honeywell tested and evaluated dozens of OT cybersecurity software products in its labs The reality is that, over the years, Honeywell tested and evaluated dozens of OT cybersecurity software products in its labs – for itself and its customers. The company gained profound insight into what is considered a best-in-class solution and applied that insight as it developed Cyber Insights. Inventory of assets on the network Carpenter says he had three must-haves before removing the previous cyber tool and replacing it with Cyber Insights. First, the solution needed to be capable of accurately determining the inventory of assets on the network. Second, he and his team needed the capability to be able to passively detect any malicious activity happening on the network. Third, the solution should be designed to accurately identify the version of the operating system or firmware on each asset and when it needs to be patched or updated. “Cyber Insights delivered on every one of those must-haves,” says Carpenter. “Honeywell now has far greater visibility into all the assets on the network that manage, monitor and control its industrial infrastructure.” OT-centric environments In addition, Cyber Insights is designed to provide a layer of vulnerability defence “Having this visibility also means that, in case there is an adverse situation, we should have the ability to respond more quickly to the threat,” says Saseendran. In addition, Cyber Insights is designed to provide a layer of vulnerability defence. If an unauthorised system is trying to communicate with another asset, Cyber Insights is designed to raise flags and send alerts about the potential threat. Cyber Insights is also capable of significantly reducing unnecessary noise, particularly in OT-centric environments. “The previous product discovered 200,000 to 300,000 assets and networks across all our sites, and we didn’t understand why it was discovering so many,” explains Saseendran. “We later realised it was looking at the data and traffic incorrectly and, as a result, generating a lot of noise. When we switched to Cyber Insights and did the audit correctly, we were down to 67,000 assets across those sites. Honeywell now has far greater visibility into all the assets and networks that manage, monitor and control its industrial infrastructure.” Deployment of Cyber Insights Cyber insights are designed to make the implementation process easy Carpenter is the process of deploying Cyber Insights to 120 of Honeywell’s vital manufacturing sites Another major downside to that original off-the-shelf tool was that it was very difficult and time-consuming to implement. At each site, it took Honeywell four to six months to get up and running with the solution. “There are over 400 factory sites at Honeywell,” says Saseendran. “We simply cannot invest six months per site to implement the solution. That’s why efficient implementation is so critical.” In contrast, Honeywell implemented its first Cyber Insights site in less than a month, with seven sites implemented in two months. Carpenter is now in the process of deploying Cyber Insights to 120 of Honeywell’s most critical manufacturing sites. Honeywell’s experience indicates that a typical single-site deployment of Cyber Insights takes about 33% less time than the previous solution utilised by Honeywell. In addition to ease of implementation, Cyber Insights’ clear and straightforward representation of the network landscape simplified asset configuration and viewing, which is crucial for asset discovery without resorting to manual audits. Since going live with Cyber Insights, Honeywell observed an 18% to 20% increase in asset discovery within the Honeywell-deployed sites. This is a significant benefit that eliminates the need for manual workstation audits, which are often error-prone and unreliable. The Honeywell difference Reality is that OT cybersecurity is lazing because it needs specialised tools and knowledge Cyber teams have become skilled at implementing solutions, practices and procedures designed to improve security for IT systems; however, the reality is that OT cybersecurity is lagging because it requires specialised tools and knowledge. Organisations simply can’t use the tools they have in the IT space when managing their OT environment Honeywell has approached this challenge by leveraging its vast experience in the OT world to develop Cyber Insights. “We have a very complex environment, including small sites, large sites and sites around the world,” says Saseendran. “If Cyber Insights works for us in our manufacturing sites, it will very likely work for our customers as well. There is no silver bullet to fully secure your OT environment,” says Carpenter. “However, Honeywell currently offers one of the most complete sets of products and services that can help organisations improve their protection of their critical OT assets.” Robust cybersecurity solution for the OT environment Implementing Cyber Insights is like getting a good pair of glasses for the first time – everything becomes clear, and with that clarity comes new speed and efficiency. If there is an attack, Cyber Insights is designed to help cyber teams identify the source and know where to focus, which can help their organisations save valuable time and resources. It is not an install-once and-walk-away solution, but rather a constant companion in the battle against cybercrime. If they are looking for a comprehensive and robust cybersecurity solution for the OT environment, look no further than Honeywell Forge Cybersecurity+ | Cyber Insights. This solution can help them improve the visibility, control and resilience of the OT network, and help to improve their ability to protect it from cyber threats that could harm the business and reputation.

Insights & Opinions from thought leaders at Forge

How do personal electronics impact what customers expect from security?

The intersection of consumer electronics and the physical security marketplace is a fertile sector for growth and innovation. Consumers increasingly have the same high expectations for the operation of their workplace technologies as they are accustomed to in the digital world at large. We asked this week’s Expert Panel Roundtable: How do developments in personal electronics impact customer expectations in the physical security market?

Quick poll
Which trend do you think will define physical security in the next 5 years?