How USB Attacks Work
To understand how SMX works, it’s important to understand how USB attacks work. First of all, there is not just one type of USB Attack. There are many ways for USB attacks to occur. It is likely that the future will hold even more ways for these attacks to occur. The ultimate goal of many types of USB attacks, though, especially those attacking businesses, is to access the Industrial Control System (ICS). ICS is a general term used to describe types of control systems used in industries, including telecommunications, power generation, and chemical processing. Each ICS is different, but once malware has reached the ICS, it has the potential to cause extensive amounts of damage.
How SMX Works
SMX includes advanced malware detection that uses artificial intelligence (AI) to help detect more types of potential malware technology, including zero days and malicious malware. Though this advanced malware detection technology can help decrease the number of USB attacks, what sets the technology apart is that it includes Trusted Response User Substantiation Technology. TRUST technology requires whoever is using the USB to validate and authenticate the USB. Combining AI with human knowledge is becoming a trend in many fields and can lend a human element to technology, thereby increasing the potential of both. The TRUST technology trains those using a USB to look for potential issues every time they use a USB. This simple step could lead to a huge potential decrease in the number of USB attacks that affect companies. As well as TRUST technology, SMX also includes new centralized management, ICS shield integration and an expanded SMX offering.
Honeywell demonstrated its new technology March 3 at the RSA Conference in San Diego. To learn more, visit the company’s website.