Skip to main content
GE Digital

IIoT Cyber Security Trust Center

The Predix portfolio and industrial applications are secure by design, and supported by cloud operations that adhere to the strictest industry standards and latest best practices.

Download infographic
header-security-control-room-184811686-3200x1404.jpg
OT Security Trust Center Diagram | GE

From the edge to the cloud

Predix Platform and our industrial applications are built to meet the most stringent security and compliance requirements, so you can adopt the right technologies and processes that deliver positive outcomes for IIoT investments. As digital industrial companies evolve, optimizing operations requires complete, valid, unimpeded, and, above all else, secure data.

 

New, more advanced threats are targeting operational environments, so with our platform and industrial applications, you can bridge the worlds of IT and OT and protect data as it travels from the edge to the enterprise and back again. By building security into the design of our portfolio of industrial applications, we’ve assured that you can connect with confidence, knowing that your data, processes, and outcomes are delivered in a resilient environment.

Products and services to help you ensure your own OT network security

Defense-in-depth

Predix is designed for "defense-in-depth" on the infrastructure, platform, software, and communication layers. This covers the multitude of IT and OT devices and network connections for delivering positive digital industrial outcomes.

Security-first mindset

Predix combines thorough manufacturing, supply chain, and production security. Applications are scrutinized and tested during the development life cycle to ensure security resilience before deployment.

Continuous monitoring

Predix ensures integrity throughout the data and communications life cycle. Data is shared from IT/OT environments into the cloud while the runtime environment is monitored for anomalies requiring incident response.

Security and compliance at every level

module-security-governance-control-operator-201540966-1792x1280.png

Governance, compliance, and certification

GE Digital's holistic approach comprises international standards, security controls from vertical markets, and regional variations. Predix helps to ensure that an organization’s fine grained controls (specific to geography or industry) are in place, validated, and audit-ready. This removes the cost for an organization to design and build their own security controls. Predix is built on a common infrastructure governance model based on ISO 27001/2, NIST 800-53, and FIPS 140-2.

module-security-pdlc-graphic-1792x1280.png

Secure platform and applications

GE's secure development lifecycle (SDLC) framework includes tools, security-related guidelines, and processes that help to secure Predix applications and services during the development process.

module-security-monitoring-software-141375033-1792x1280.png

Continuous monitoring and incident response

Predix is continuously monitored by security analysts for anomalies and suspicious events that may require incident response. GE Digital’s Incident Response Program, includes on-going training, table-top exercises, pen testing, vulnerability management, and threat intelligence. Predix incident responders handle end-to-end coordination with stakeholders for swift deterministic notification, investigation, forensics, and close-out.

OT Cyber Security | GE Digital

Penetration Testing

GE’s platform and applications undergo ongoing penetration testing to identify areas where business risk may exist. Considering attack vectors, a highly specialized team of researchers carries out test scenarios and a process is in place to address any findings.

Resources

GE Digital educational services for cyber security

OT Security Services

Understand network and device vulnerabilities, plus the risk and recommended mitigations.

Predix software engineer | GE Digital

How it Works

From the edge to the cloud, cyber security is paramount to our IIoT ecosystem. 

To report a security issue, please visit our Security Concern & Compliance Reporting page.