Honeywell Forge Cybersecurity Cyber Insights

By Honeywell

Unclaimed Profile

Claim Honeywell Forge Cybersecurity Cyber Insights profile for Free

Your G2 page is often the first place buyers evaluate you. Take control of how your brand shows up.

WHAT YOU UNLOCK

Control your profile

Update logo, screenshots, pricing info

Engage with customers

Respond to reviews, build trust with prospects

See buyer activity

Track who’s viewing, understand engagement

Collect reviews

Create landing page and collect reviews

Sellers who actively manage their G2 profile build more trust and convert more buyers

5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Honeywell Forge...?

It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Honeywell Forge Cybersecurity Cyber Insights Reviews & Product Details

Product Avatar Image

Have you used Honeywell Forge Cybersecurity Cyber Insights before?

Answer a few questions to help the Honeywell Forge Cybersecurity Cyber Insights community

Honeywell Forge Cybersecurity Cyber Insights Reviews (1)

Reviews

Honeywell Forge Cybersecurity Cyber Insights Reviews (1)

5.0
1 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
AA
Tax Manager
Construction
Mid-Market (51-1000 emp.)
"Increased compliance with the sector standards"
What do you like best about Honeywell Forge Cybersecurity Cyber Insights?

SCADAfence assists me to divide the ICS network from the internet and other networks that are not trusted. This segmentation tends to minimise the attack surface area and minimise the attack surface area and minimise the li9kelihood of an adversary gaining access to critical OT systems. Review collected by and hosted on G2.com.

What do you dislike about Honeywell Forge Cybersecurity Cyber Insights?

I noticed that there are specific issues with detecting various kind of anomalous behaviour in the sub-divided ICS network. This has led to a few omissions to certain security incidents that would have been noticed only otherwise. Review collected by and hosted on G2.com.

There are not enough reviews of Honeywell Forge Cybersecurity Cyber Insights for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.4
(117)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(101)
Microsoft Defender for IoT is a comprehensive security solution designed to protect Internet of Things (IoT and operational technology (OT environments. It offers real-time asset discovery, vulnerability management, and cyberthreat protection for industrial infrastructures, including industrial control systems (ICS and OT networks. By providing complete visibility into all IoT and OT assets, Defender for IoT enables organizations to manage security posture effectively and reduce the cyberattack surface area. Its agentless, network-layer monitoring ensures seamless integration with existing systems without impacting performance. Key Features and Functionality: - Context-Aware Visibility: Gain comprehensive insights into all IoT and OT assets, including device details, communication protocols, and behaviors. - Risk-Based Security Posture Management: Identify and prioritize vulnerabilities using a risk-prioritized approach to minimize the cyberattack surface. - Cyberthreat Detection with Behavioral Analytics: Utilize IoT and OT-aware behavioral analytics and machine learning to detect and respond to cyberthreats effectively. - Agentless Monitoring: Deploy non-invasive, passive monitoring that integrates seamlessly with diverse industrial equipment and legacy systems. - Unified Security Operations: Integrate with Microsoft Sentinel and other security information and event management (SIEM systems for centralized monitoring and governance. Primary Value and Problem Solved: Defender for IoT addresses the critical need for robust security in IoT and OT environments, which are often vulnerable due to unpatched devices, misconfigurations, and lack of visibility. By providing real-time asset discovery, continuous monitoring, and advanced threat detection, it empowers organizations to proactively manage risks, ensure compliance, and protect critical infrastructure from evolving cyberthreats. This solution enables seamless integration with existing security operations, fostering a unified approach to IT and OT security.
3
BeyondTrust Privileged Remote Access Logo
BeyondTrust Privileged Remote Access
4.5
(61)
Privileged Remote Access is a unified access solution. You can provide seamless, secure access to nearly any system, from anywhere via innovative egress techniques and a single administrative console.
4
AWS IoT Device Defender Logo
AWS IoT Device Defender
4.4
(58)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
5
MSP360 Connect Logo
MSP360 Connect
4.2
(52)
MSP360 Connect is a fast and secure remote access solution enabling remote support, helpdesk assistance, remote work, distance education, and more. It allows users to access and control Windows devices from any operating system at any time regardless of the computer’s global location.
6
DoveRunner Logo
DoveRunner
4.7
(52)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
7
Azure IoT Hub Logo
Azure IoT Hub
4.3
(44)
Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application development.
8
Rayven Logo
Rayven
4.9
(40)
No/low/full-code platform for building apps, AI tools + automations. Rayven enables you to integrate systems, unlock data sources, and build custom apps with business-orientated AI capabilities, simply.
9
Appgate SDP Logo
Appgate SDP
4.8
(34)
Appgate SDP secures the network with a Software-Defined Perimeter's network security model that dynamically creates one-to-one network connections between the user and the resources they access.
10
Google Cloud IoT Core Logo
Google Cloud IoT Core
4.1
(30)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
Show More
People Icons

Start a Discussion about Honeywell Forge Cybersecurity Cyber Insights

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Honeywell Forge...