Zero-trust architecture
With zero-trust architecture, granular access controls and micro-segmentation is managed to reduce the attack surface and provides protection against unauthorized access, lateral movement and malware propagation.
Data Centers
Our data center infrastructure helps to streamline operations with increased uptime to achieve critical business goals.
Learn moreYour gateway to your sustainability and business goals
Digital solutions that improve energy efficiency, reduce carbon emission, optimize space use and equipment performance, and ensure health and wellbeing of occupants.
Learn moreApplying data from both inside buildings and beyond, our customers can now manage operations systemically.
Learn moreAchieve decarbonization and renewable energy targets and optimize building performance.
Learn moreIndoor air quality is essential for the well-being, health, and productivity of the people inside every building, new and old.
Learn moreOptimize the performance of your building with OpenBlue, a complete ecosystem of connected technologies, expertise and services.
Learn more about OpenBlueUnlock the performance of your building and provide real-time data visibility across assets, people, and processes with OpenBlue Enterprise Manager.
Learn more about OpenBlueFunding more than $6B in customer projects worldwide, we partner with you to determine the best way to make your project happen.
Explore พรพรสำฦต CapitalFunding more than $6B in customer projects worldwide, we partner with you to determine the best way to make your project happen.
Explore พรพรสำฦต CapitalFunding more than $6B in customer projects worldwide, we partner with you to determine the best way to make your project happen.
Explore พรพรสำฦต capitalOur company has been the innovation leader, transforming and shaping the industry for 140 years. As we mark this milestone, we remain focused on what's ahead -- driving the next era of transforming industries and powering our customers' missions.
Learn moreAs part of OpenBlue — and built on our deep experience and customer focus — our products and solutions help you manage cybersecurity risks for your smart buildings.
พรพรสำฦต products are developed using a secure-by-design approach. Security features for each solution are selected based on the application and environment they are targeted for.
Here are just a few examples of the advanced safeguards and assurances you can find within our solutions:
With zero-trust architecture, granular access controls and micro-segmentation is managed to reduce the attack surface and provides protection against unauthorized access, lateral movement and malware propagation.
Remote Access/Software Defined Perimeter (SDP):
Protecting a device starts at boot time with protection spanning the hardware and software stack. Secure boot ensures that a device starts using only unaltered software that is trusted by the Original Equipment Manufacturer (OEM).
Examples: Metasys, , iSTAR Door Controller
Video from surveillance systems is often considered sensitive data. By encrypting the video streams customers can have the assurance that privacy is maintained.
Examples: ,
Helps administrators understand and address potential concerns. Identify issues such as:
• Out-of-date softwareConformance with IEC/ISA 62443-4-2 ensures that product and solutions have sufficient safeguards within the software applications and embedded devices have sufficient safeguards according to appropriate security levels.
Examples: , ISASecure CSA for Chillers
specifies the security requirements that will be satisfied by a cryptographic module, providing for increasing, qualitative levels intended to cover a wide range of potential applications and environments.
Examples:
Metasys, iSTAR Door Controller
พรพรสำฦต creates solutions which respect global fair information practices and Privacy by Design.
OpenBlue is a complete suite of connected smart building solutions, from edge to cloud. OpenBlue and other cloud-based solutions from พรพรสำฦต hosted in Microsoft Azure, Google Cloud or Amazon Web Services are protected environments that conform to industry recognized standards, such as:
Additional security compliance information for these environments is available at:
For everything from asking a question to raising an alarm, please use this form for a quick response from our พรพรสำฦต cybersecurity organization.
Report a potential vulnerability or cybersecurity concern | Ask about Products and Services | Learn about protecting your smart building
Cybersecurity testing may be conducted on พรพรสำฦต solutions. We recommend that tests are conducted in a non-production test environment to protect against disruption to operations.
A security test may produce field correctable findings if the steps outlined in the associated product Hardening Guide (Resources) are not followed.
Before conducting security tests, fully execute steps in the Hardening Guide (Resources). The following hardening steps, if not conducted, are known to result in addressable security findings:
If a test tool detects potential issues with a พรพรสำฦต component, you may share the results with พรพรสำฦต or report other cybersecurity concerns at this link - /trust-center/cybersecurity/security-advisories#ReportAVulnerability, you may also contact us at productsecurity@jci.com.
Please use our downloadable PGP key to secure communications.