Skip to main content
GE Digital

Cyber Security and Data Governance

The Predix portfolio of platform and applications are secure by design, and supported by cloud operations that adhere to the strictest industry standards and latest best practices.

Download infographic
header-security-control-room-184811686-3200x1404.jpg

Cyber security is paramount to the Predix platform for the IIoT and its "secure by design" ecosystem

The Predix Security Pledge

Predix Secure by Design diagram | GE Digital

From the edge to the cloud

Predix is built to meet the most stringent security and compliance requirements, so you can adopt the right technologies and processes that deliver positive outcomes for IIoT investments. From the machine on the shop floor to the business analytics in the enterprise, Predix connects machines to minds. As digital industrial companies evolve, optimizing operations requires complete, valid, unimpeded, and, above all else, secure data.

 

New, more advanced threats are targeting operational environments, so with Predix, you can bridge the worlds of IT and OT and protect data as it travels from the edge to the enterprise and back again. By building security into the Predix design, we’ve assured that you can connect with confidence, knowing that your data, processes, and outcomes are delivered in a resilient environment.

Security design principles

Platform

Building security into the design of the entire platform.

Application

Extending that security into the application development process.

Operations

Executing a 24/7 security operations center for continuous monitoring and response.

Security and compliance at every level

Infographic | Predix Essentials from GE Digital | EAM HMI MES connectors | cloud | dashboard

Secure support

Predix platform and applications support a wide range of industry, regional, privacy and data governance regulations, and our security practices encompass perimeter security, data security, and access control.

module-security-pdlc-graphic-1792x1280.png

Secure platform and applications

GE's secure development lifecycle (SDLC) framework includes tools, security-related guidelines, and processes that help to secure Predix Platform-powered applications and  services during the development process.

module-security-governance-control-operator-201540966-1792x1280.png

Governance, compliance, and certification

GE Digital's holistic approach comprises international standards, security controls from vertical markets, and regional variations. Predix Platform helps to ensure that an organizations fine grained controls (specific to geography or industry) are in place, validated, and audit-ready. This removes the cost for an organization to design and build their own security controls. Predix Platform is built on a common infrastructure governance model based on ISO 27001/2, NIST 800-53, and FIPS 140-2.

module-security-monitoring-software-141375033-1792x1280.png

Continuous monitoring and incident response

Predix Platform is continuously monitored by security analysts for anomalies and suspicious events that may require incident response. GE Digital’s Incident Response Program, including on-going training, table-top exercises, pen testing, and vulnerability management, is enhanced by its threat intelligence program. Predix Platform incident responders handle end-to-end coordination with stakeholders for a swift, deterministic incident response from incident notification, investigation, forensics, and close-out.

Products and services to help you ensure your own OT network security

Opshield
OT Security

OpShield

Designed to help protect your critical infrastructure and controls network by defending the processes, communications, and assets that underpin your control…

Achilles Test Platform
OT Security

Achilles Test Platform

Find vulnerabilities through automated network testing tailored to OT devices.

GE Digital educational services for cyber security
Cyber Security and Data Governance

OT Security Services

Understand the vulnerabilities in your networks and devices, and learn how to reduce risk and recommended mitigations in OT environments.