DCS; Industrial control system
NameDescriptionContent
NEW CENTER
Current Location:

Cybersecurity Preparedness for Oil, Gas and Petrochemical Operations

From:automation | Author:H | Time :2024-11-27 | 86 Browse: | Share:

Cybersecurity Preparedness for Oil, Gas and Petrochemical Operations

Industrial companies often pride themselves on their safety culture, but few have elevated or advanced cybersecurity activities to a similar level of visibility and prestige. Stuxnet, the first known cyberweapon, hit industrial control systems in the 2010s and, in the dozen years since, information technology (IT) professionals and industrial automation and control system (IACS) experts have worked to protect operational technology (OT) and business systems from similar threats. Unfortunately, cyber threats keep evolving, IT and OT efforts are often unaligned, and many industrial companies struggle to achieve what might be called cybersecurity maturity.

Help is available from the International Society of Automation (ISA) in multiple forms. This article highlights resources available from ISA and the ISA Global Cybersecurity Alliance (ISAGCA) including the ISA/ IEC 624443 Series standards and online cybersecurity training, and reports on some research from ISA’s news and publications subsidiary, Automation.com. It also reveals how Malaysia’s national oil and gas company, PETRONAS, is building “institutionalized capability” in OT cybersecurity to become one of the world’s most cyber mature organizations.

Increasingly frequent and often high-profile attacks like the Colonial Pipeline incident in the U.S., as well as new government regulations around the world, have spurred industrial companies to improve cybersecurity. But studies by McKinsey & Co., Gartner and others reveal that companies fall into a range of maturity levels when it comes to cybersecurity preparedness and protections.

Companies in the energy sector—including oil & gas, electric power generation, coal, renewable energy, and related systems and services—have been the most frequent target of OT cyberattacks in recent years, so it’s not surprising to find a lot of cybersecurity interest and awareness in those companies. Automation.com conducted a survey in May 2023, sponsored by Fortinet, of OT professionals in oil and gas and petrochemical companies to ask about their OT cybersecurity actions and perceptions.

Slightly more than half of respondents believe their companies are on par or above average compared to industry peers when it comes to securing OT systems. These companies seemed more mature in their cybersecurity posture, having completed all or most recommended tasks. The other half of respondents were notably less mature, with plans but little implemented so far.

The survey revealed that some of the concerns of process control engineers and other automation professionals were:

  • The increasing risk of cyberattacks on OT systems including supervisory control and data acquisition (SCADA), industrial control, and pipeline control. Recent high-profile attacks have highlighted vulnerabilities.

  • The rapid evolution cyber threats, which require continued vigilance and adaptation from companies to detect and mitigate new attack vectors.

  • Safety risks, including environmental incidents or harm to human health/safety, resulting from successful cyberattacks that disrupt industrial processes and plant operations.

  • Shortage of skilled workers to properly secure systems, detect threats, and respond to incidents.

  • Insufficient collaboration between IT and OT teams within organizations to ensure integrated security policies, technology, monitoring and response.

The report suggests OT cybersecurity be made an organization-wide priority, with strong leadership, governance, training, and technological protections put in place to create robust, secure operational environments.


ISA/IEC 62443 standards

Insufficient collaboration between IT and OT teams can result in a lack of alignment between the two groups’ assumptions, procedures, and motivations about cybersecurity. The hardware and software technology used by each group can be similar, but how they are used is often very different. The convergence of IT and OT security ends up being as challenging as the integration of the systems themselves.

Seeing the need for OT-specific cybersecurity action and advocacy, ISA created the ISA Global Cybersecurity Alliance (ISAGCA) in 2020. At the time, Andre Ristaino, managing director of Global Consortia and Conformity Assessment for ISA said, “The operational technologies and control systems that automate critical infrastructure are experiencing a rapid increase in malicious cybersecurity attacks that include data breaches and ransomware. The impact is serious, affecting life, safety, environmental protection and economic viability across sectors. ISAGCA is driving alignment and clarity across public and private sectors.”

The foundation of ISAGCA’s work is ISA/IEC 62443, a series of ISA-developed, consensusbased security standards for automation and control system applications. The ISA/IEC 62443 series of standards address all entities involved in the protection of operating facilities (Figure 1). Various stakeholders—including industrial product designers, system integrators, service providers, and asset owners—leverage ISA/IEC 62443 Series standards to create secure products and systems, conduct risk assessments and much more.

Figure 1: The ISA/IEC 62443 series of standards addresses all entities involved in the protection of operating facilities. Visit ISA.org for the most up-to-date information. Source: ISA

“The series approaches the cybersecurity challenge in a holistic way, bridging the gap between operations and information technology, and between process safety and cybersecurity,” said Ristano.

According to an ISAGCA whitepaper, “Many organizations (especially very large ones) have established policies and procedures governing the IT security in their office environment; many of these are based on ISO/IEC 27001/2 [27001] [27002]. Some have attempted to address their operational technology (OT) infrastructure under the same management system and have leveraged many IT/OT commonalities.

“Although it would be ideal to always select common controls and implementations for both IT and OT, organizations have been confronted with challenges in doing so: the locking of an OT operator screen creating unsafe conditions, antivirus products incompatible with OT equipment, patching practices disrupting production schedules, or network traffic from routine backups blocking safety control messages. The ISA/IEC 62443 Series standards explicitly address issues such as these; this helps an organization to maintain conformance with ISO/IEC 27001 through common approaches wherever feasible, while highlighting differences in IT versus OT approach where needed.”

The whitepaper offers guidance for organizations familiar with ISO/IEC 27001 and interested in protecting the OT infrastructure of their operating facilities based on the ISA/ IEC 62443 series. It describes the relationship between the ISA/IEC 62443 series and ISO/ IEC 27001/2 and how both standards may be effectively used within one organization to protect both IT and OT.



PETRONAS leverages ISA/IEC 62443

PETRONAS, Malaysia’s national oil and gas company, is a dynamic global energy group with presence in more than 100 countries. According to Sharul A. Rashid, PETRONAS GTS head of technical excellence and group technical authority for instrumentation and control, the enterprise-wide cybersecurity program for PETRONAS started in 2018.

“A five-year roadmap toward building an institutionalized capability in OT cybersecurity was crafted and subsequently approved in 2019,” said Rashid. “The institutionalized capability-building program was established mainly to create a culture of cybersecurity and to ensure the ongoing suitability and competence of personnel commensurate with the risk to critical infrastructure. The organizational objectives were: responsibilities; workforce controls; knowledge, skills and abilities; and awareness.

At that time, the task force consisted of Sharul, principal instrument and control (I & C) engineers Azmi Hashim and Michael Ng Chien Han, and senior I & C engineer Ping Yang. All four men helped shape and steer the PETRONAS OT cybersecurity program.

In November 2020, PETRONAS became a founding member of ISAGCA. By February 2021, it started attending ISAGCA Government Relations—Asia Pacific meetings. “We learned that ISAGCA aspired to designate and reference the ISA/IEC 62443 standard in a country’s law and regulatory policy. So, for Malaysia, we started our efforts to support that,” said Rashid.

OT Risk Management for PETRONAS is based on the ISA/IEC 624443-3-2 Standard, said Ng Chien Han. “Cyber risk of an OT system is established by evaluating the business impact of that system, if it is compromised, and the likelihood of that compromise happening. Business impact is evaluated from the lens of how it affects people, environment and assets, as well as the company’s reputation. The likelihood is established via control compliance in addressing threats from a cyber security threat register,” he explained.

In September 2023, “PETRONAS reached a milestone by—for the first time—executing a cybersecurity risk assessment as part of the engineering design stage of a capital project,” Rashid added. “Through the risk assessment, the Security Level Target (SLT) of each OT system of the project was established. This exercise provided the EPCC (Engineering, Procurement, Construction, and Commissioning), OT, and OT vendors with detailed security specifications for the systems being designed. The specifications to be delivered are from the ISA/IEC 62443-3-3 system security requirements and security levels standard in addition to the PETRONAS technical standards,” he explained.

PETRONAS has made good use of the wide range of cybersecurity resources that ISA offers (see sidebar). “Utilizing the ISA/ IEC 62443 standards in engineering design has helped advance cybersecurity discussions with the OT vendors in delivering secured-by-design OT systems. It has also helped PETRONAS as a tool to strengthen the cybersecurity awareness and practices of its partners and collaborators,” said Rashid.

ISA offers multiple levels of OT cybersecurity training courses. Students who complete the courses and associate exams can earn certificates that demonstrate their growing cybersecurity maturity. Source: ISAGCA.


Role of training and certification

Facing increasing threats of cyber-attacks, PETRONAS sought to better train its staff. “We realized that both IT and OT personnel must work together, and we applied an IT-OT convergence strategy in action,” said Rashid. “We quickly built up and nurtured our best performing team in this area as a high-level, IT-OT converged cybersecurity taskforce, guided by the ISA/IEC 62443 standards’ sustainable, international best practices. As part of this program, competency and capability building was one of our primary agenda points,” he explained.

As part of the competency goals, PETRONAS decided that all cybersecurity task force members would be trained. The team reviewed available OT cybersecurity trainings and chose ISA online certificate courses including Cybersecurity Fundamental, Risk, Design and Maintenance courses and passed four certificate exams to earn ISA/IEC62443 Expert Certificates.

PETRONAS added other trainings, such as the PETRONAS cybersecurity project for OT, short trainings on human defense/ firewall, and more. New IT personnel “attend onboarding programs to ensure that they understand very well the criticality and priority of the OT environment. We are also extending the awareness training to the frontline, such as panel operators and boardmen who are monitoring and controlling OT assets via distributed control systems (DCS) 24/7, 365 days a year,” he said.

More than 1,000 manhours were spent conducting awareness training. “Combining ISA trainings with other relevant trainings, I believe that PETRONAS is moving forward in the right direction toward our goal of enhancing our cybersecurity culture,” said Rashid.

With the staff trained in ISA/IEC 62443, Rashid said PETRONAS personnel are “able to communicate our cybersecurity goals more effectively to our stakeholders and vendors. Knowledge in the standards have also helped us shape the cybersecurity governance framework of our organization.”


Addressing vulnerabilities, supporting staff

In general, OT cybersecurity incident reporting reveals more unauthorized attempts and a marked increase in malicious code attacks. Rashid believes OT systems will be subject to the same vulnerabilities as IT systems, especially as industrial control systems employ more commercial off-the-shelf (COTS) hardware and software with more embedded IT technology such as MS Windows operating system, Ethernet IP-based communication, and virtualization such as VMWare and Hypervisor.

“Common cyber incidences include blue screens, denial of service (DOS), and unauthorized remote access. Therefore, aggressive education, training, visual management, audits, and the courage to give feedback to staff on cybersecurity malpractices is surely needed,” said Rashid. Rashid and Hasim published a case history article showing some of the “aggressive education,” training, and visual management tools PETRONAS used to create the cybersecurity culture they wanted. See the ISAGCA blog titled, “Accelerating Cybersecurity Culture Maturity in the Workplace.

“Today, an established, experienced and matured cybersecurity team is collaboratively working as a fully converged IT-OT enterprise level entity. Core to sustaining PETRONAS’ cybersecurity maturity ambitions was the establishment of a cyber risk management framework. In this regard, PETRONAS has developed a standardized cybersecurity risk management program to cover both IT and OT domains,” said Rashid.

“As part of an accelerated cybersecurity culture at the workplace, one must engage staff, conduct awareness training, and foster an understanding that becoming inactive and uneducated on cybersecurity risk management can lead to a major loss of business,” said Rashid. “In leading the OT Cybersecurity team at PETRONAS, we engage and support staff as much as possible. We build and nurture our best performing teams with our new cybersecurity taskforce, as well as guide them using international standards and best practices on sustainable, pragmatic approaches."


ISASecure and other OT cybersecurity work ISA is doing

Industrial automation and control system cybersecurity, also known as operational technology or OT cybersecurity, is one of the most critical issues facing manufacturing and industrial companies around the world today.

The International Society of Automation plays a key role in helping to protect people, operating sites, products, and systems through its wide range of resources built on the ISA/IEC 62443 series of standards.

As Andre Ristaino, managing director of Global Consortia and Conformity Assessment for ISA explains, “ISA is addressing multiple dimensions of the challenge and seeking to elevate OT cybersecurity from an art to a science and ultimately to an engineering discipline.”

While the ISA Education department trains and certifies personnel on the OT cybersecurity topics, for example, the ISASecure program certifies commercial off-the-shelf (COTS) devices and systems to the ISA/IEC 62443 series of standards. This makes it easier for asset-owner companies like PETRONAS to build secure systems.

“When ISASecure becomes an integral part of an asset owner’s overall security strategy and program, they can include ISA/IEC 62443 product and system conformance in their procurement specifications,” said Ristaino. “That means there are fewer security mitigations needed at the operating site.” The ISASecure program was founded in 2007 and has been elevating the security levels of COTS products since 2010, he added, and “some companies are now informing suppliers that they want ISASecure-compliant products.”

ISASecure has developed a 3-day training class for product developers and assessors (IC47) to teach them how to develop secure products conformant to ISA/IEC 62443-4-1, 4-2, 3-3. “ISASecure is also developing a new program to certify OT systems to ISA/IEC 62443 deployed at operating sites like PETRONAS, along with a 3-day assessor training class,” Ristaino said. Other OT cybersecurity work is being done by ISA in: Standards development. The ISA99 Standards committee writes and publishes the ISA/IEC 62443 standards on which all ISA OT cybersecurity activities are based. The work of this group of ISA volunteers “codifies what amounts to thousands of years of combined experience in OT cybersecurity,” said Ristaino.

Workforce development. ISA educates more than 3,000 students per year on automation and control cybersecurity topics through its online and in-person Training courses and annual events. ISA’s inaugural OT Cybersecurity Summit was held in Aberdeen, Scotland in 2023 and the 2024 summit will be held in London June 18-19.

Credentials. ISA’s Cybersecurity Certificate programs provide credentials to OT cybersecurity professionals. “ISA offers the most comprehensive set of industrial cybersecurity certificate programming and aligned training courses in the world,” said Ristaino. The programs are designed to deliver in-depth, OT-specific knowledge through a series of training courses designed to increase the cybersecurity maturity of individuals and entire organizations. It’s another step in the journey toward a culture of cybersecurity.

Advocacy. The ISA Global Cybersecurity Alliance (ISAGCA) advocates for adoption of ISA/IEC 62443 by suppliers, asset owners, integrators, and public policy makers, and develops work products to accelerate adoption. The ISAGCA blog regularly provides information on risk assessment, compliance, education, and more.

Incident response. The ICS4ICS, or Incident Command System for Industrial Control Systems, is an ISAGCA effort that helps operating sites respond to and recover from attacks. It provides workforce development and credentialling for “incident commanders”—the people who must respond to industrial control system breaches and other cyberattacks. For response structure, roles, and interoperability, ISAGCA joined forces with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity response teams from more than 50 participating companies to adapt the Federal Emergency Management Agency (FEMA) Incident Command System. This system is used daily by first responders worldwide in emergency situations like fires, industrial accidents, extreme weather events, and other high-impact situations.


  • Honeywell 30735863-502 - SWITCH
  • Honeywell TK-CCR014 - REDUNDANT NET INTERFACE NEW ORIGINAL FREE EXPEDITED SHIPPING/
  • Honeywell 51403165-400 - new 51403165400/
  • Honeywell318-049-001 - "100 Batteries(Japan Liion2Ah14.8Wh)INTERMEC/ PR2,PR3 P/N.:."
  • Honeywell FC-PSU-UNI2450U - Power Supply
  • Honeywell 965-0676-010 - WARNING COMPUTER SV
  • Honeywell 51403519-160 - module
  • Honeywell 107843 - HOUSING CARBON FILE P/N NE COND # 11438 (4)
  • Honeywell VR434VA5009-1000 - Brand new in box Condensing boiler valve DHL fast shipping
  • Honeywell SPXCDALMFX - plc new FREE EXPEDITED SHIPPING/
  • Honeywell BCM-PWS - BCM-ETH BCM-MS/TP BCM-MS/TP Network controller setFedEx or DHL
  • Honeywell YSTR12D-22/C/-2J0DFA/BE/400/T/-CM.HO.TG.SB.SM,ZS,F1,LP,/FX/,1C-BT - UNMP
  • Honeywell IWS-1603-HW - 90-250VAC 1.0A UNMP
  • Honeywell 51304386-150 - MEASUREX Factory Packed
  • Honeywell CC-IP0101 - Profibus Gateway Module
  • Honeywell CC-PFB401 - / CCPFB401 (NEW IN BOX)
  • Honeywell 50071726 - St 800 Series Pressure Transmitter Remote Diaphragm 11-42VDC
  • Honeywell 621-2150 - / 6212150 (NEW NO BOX)
  • Honeywell 80360206-001 - USED YAMATAKE CLI BOARD
  • Honeywell BMDX001A-001 - ACCURAY / BOARD BMDX001A001
  • Honeywell XCL8010A - New CPU Controller.
  • Honeywell PGM-7320 - 1PCS NEW Rae Systems MiniRAE 3000 Portable VOC Monitor#XR
  • Honeywell BK-G40 - U65 *FULL INSTALLATION* Gas Meter 3?± Inlet/Outlet Spool NEW UNUSED
  • Honeywell DM106-0-B-00-0-R-1-00000-000-E0 - DPR100 250V NSNP
  • Honeywell KFD840 - PRIMARY FLIGHT DISPLAY CORE PN: 066-01206-0104
  • Honeywell 51401914-100 - 51400996-100
  • Honeywell TK-PRS021 - Module Via FEDEX/DHL
  • Honeywell C7012A1145 - 1PC New UV Flame Detector Expedited Shipping
  • Honeywell OV210 - Baxter Bakery Oven Igition Control. For DRO. 00-616973 NEW
  • Honeywell 51304431-125 - 1PC New /51304431125 1 year warranty#XR
  • Honeywell QPP-0002 - Quad Processor Module / 5 Vdc / Massima 1.2A/24Vdc/max.25mA
  • Honeywell QPP-0002 - Quad Processor Module / 5Vdc / Max. 1.2A/24Vdc/max.25mA
  • Honeywell 8C-PCNT02 - 514543363-275 module
  • Honeywell DPCB21010002 - Tata Printed Circuit Board
  • Honeywell DPCB21010002 - Tata Printed Circuit Board Rev: 0
  • Honeywell 001649-M5T028 - Tata Printed Circuit Board Rev: 0
  • Honeywell YSTD924-(J2A)-00000-FF,W3,TP,TG,SS - NSFS
  • Honeywell XF523-A - / XF523A (NEW IN BOX)
  • Honeywell TK-PRS021 - NEW IN STOCK ship by UPS
  • Honeywell 2MLR-AC22 - " 2mlr-dbsf,2mlf-ad4s,2mlf-dc4s,2mlr-ac22 Rack"
  • Honeywell 9436610 - MEASUREX NSMP
  • Honeywell RT10A-L0N-18C12S0E - RT10A.WLAN.IN.6803.CAM.STD.GMS
  • Honeywell 51305896-200 - P:C1 Rev D Nim Modem - FAST SHIP BY Fedex
  • Honeywell TK-FTEB01 - PCL module Brand New Fast Shipping By DHL
  • Honeywell 8694500 - Measurex Control Processor Module
  • Honeywell DR4500 - Truline and DR4300 Circular Chart Recorder
  • Honeywell EC-7850-A-1122 - / EC7850A1122 (NEW IN BOX)
  • Honeywell XNX-UTAI-RNNNN - NEW Universal transmitter DHL Fast delivery
  • Honeywell SPXCDALMFX - plc new One Year Warranty #
  • Honeywell TC-RPFM01 - C200 system card brand new Fast Shipping
  • Honeywell 51196655-100 - NSMP
  • Honeywell XCL8010A - / XCL8010A (USED TESTED CLEANED)
  • Honeywell 51198801-100 - NEW CPU INTERFACE BOARD UPGRADE KIT UPIU 51306154-100
  • Honeywell 84795 - Sputtering Target 5N Al5Cu 7830x11640x13050
  • Honeywell W7704A-1004 - / W7704A1004 (USED TESTED CLEANED)
  • Honeywell RA890G1229 - FOR FSG UV Protectorelay /PL3
  • Honeywell KFS-599B - 071-01576-0101 UHF Communication Control with Mods (28V)
  • Honeywell WPC2000 - WINTRISS 9683001 WINTRISS CLUTCH/BRAKE CONTROL *NO KEYS*
  • Honeywell C7012E1112 - 1PC C7012E 1112 Burner Detector New In Box Expedited Ship #
  • Honeywell 8C-TCNTA1 - C300 system card brand new Fast Shipping
  • Honeywell ANT67A - TCAS Antenna 071-01548-0100 w/ October 2023 Repaired 8130
  • Honeywell CC-PDIS01 - PLC Module Brand New Fast Shipping FedEx or DHL
  • Honeywell R7247C1001 - 2-4SECS NSMP
  • Honeywell ALI-80A - Collins Encoding Altimeter - P/N 622-3975-011 - Tested 8130 -Serviceable
  • Honeywell 001650-M5T028 - Tata Relay Circuit Board
  • Honeywell 51196886-100 - PC BOARDS (126201 - NEW)
  • Honeywell J-HAM10 - NSNP
  • Honeywell TC-IXL062 - 1PCS module New fedex or DHL
  • Honeywell 114M4910-6 - PISTON ASSY PN NS COND 12037
  • Honeywell C7076 - 191002B Sensor Amplifier 220/240v
  • Honeywell 510STR12D21A-B77P - NSNP
  • Honeywell 51304511-200 - Module Nim Modem Via FEDEX/DHL
  • Honeywell IC-600 - Integrated Communication Unit RCZ851E 7510700-806 Removed Working
  • Honeywell TC-IAH161 - 1PC NEW REDUNDANT NET INTERFACE one year warranty#XR
  • Honeywell 2001-100-150-126-280-20-100000 - REMAN
  • Honeywell QPP-0001 - FSC QUAD PROCESSOR PACK QPP MODULE CC V1.4
  • Honeywell 30734558-001 - / 30734558001 (USED TESTED CLEANED)
  • Honeywell STD830-E1HS4AS-1-A-ADB-11C-B-21A0-00-0000 - 4500PSI NSNP
  • Honeywell 900C75-0560 - NEW HC900 Controller module FedEx DHL Fast delivery
  • Honeywell BL870 - Bezel 7014331-921 w/ October 2018 Repaired 8130
  • Honeywell STG77L-E1G000-1-A-CDC-11S-A-20A0-00-0000 - NSMP
  • Honeywell FF-SB14E12K-S2 - / FFSB14E12KS2 (USED TESTED CLEANED)
  • Honeywell 51198685-100 - "Rev. A, 140519-2-LF Power Supply Module 10A 100-240 VAC"
  • Honeywell 942-M96-M - plc new FREE EXPEDITED SHIPPING
  • Honeywell TK-IAH161 - 1PC New ANALOG INPUT TKIAH161 Expedited Shipping
  • Honeywell C7061F2001 - 1PC UV Flame Detector New In Box #
  • Honeywell 0190-20139/D - ONE Sputtering Coating Disc 4N5TI NEW
  • Honeywell 82408667-001 - NEW MEMORY BOARD ROM/RAM 82408667001
  • Honeywell C7012A1194 - NEW IN STOCK ship by UPS
  • Honeywell TK-FTEB01 - NEW IN BOX FTE BRIDGE Brand New Fast Shipping FedEx or DHL
  • Honeywell RA890G1344 - 1pc NEW Combustion Controller DHL or FedEX
  • Honeywell DH-AP-1/ - Miller 3 Workers per System 4-3/4 Ft Overall H Post Anchor
  • Honeywell TCOAV081 - NEW IN BOX ANALOG OUTPUT EXPEDITED SHIPPING
  • Honeywell W7704D1016 - Control Unit
  • Honeywell 9437710 - USED PIDP MEASUREX / 09437710-RP MODULE REV D STOCK 1603
  • Honeywell 51403165-400 - Brand new industrial computer Fast FedEx or DHL
  • Honeywell DC3200-EE-000R-240-00000-E0-0 - New DHL FastShip
  • Honeywell 51305348-100 - / 51305348100 (USED TESTED CLEANED)
  • Honeywell CC-PAIX01 - 1PCS Brand New Expedited Shipping
  • Honeywell 51305890-175 - REV B NEW
  • Honeywell XCL8010A - NEW IN STOCK ship by UPS
  • Honeywell D18-UU0000-D00000-0000-2-0000-00-E - CHART RECORDER CHART RECORDER
  • Honeywell TC-IAH161 - ANALOG INPUT NEW 1PCS
  • Honeywell 10020/1/2 - / 1002012 (NEW IN BOX)
  • Honeywell DC3200-EE-000R-240-00000-E0-0 - Digital Controller UPS Express New Zy
  • Honeywell 2MLR-CPUH/F - 1PC NEW EXPRESS P3097E YL/
  • Honeywell 9437710 - USED PIDP MEASUREX MODULE REV D STOCK 1608
  • Honeywell CC-PAIX02 - Fast Shipping
  • Honeywell DPR500 - Brand New Fast Shipping By DHL
  • Honeywell 10004/I/F - / 10004IF (USED TESTED CLEANED)
  • Honeywell C7012E1112 - 1PCS New in box UV Flame Detector
  • Honeywell HPTZ-361W - Brand New Expedited Shipping
  • Honeywell 10006/2/1 - / 1000621 (NEW NO BOX)
  • Honeywell SC-PCMX01 - 1PC NEW RTU2020 51307195-175 SHIP EXPRESS #P2254E YL
  • Honeywell X-NPMS(H) - 1PC Network Paging Console Fire Equipment Brand New Via DHL
  • Honeywell C7012E1112 - 1Pcs new Explosion-proof flame detector
  • Honeywell 0190-20139/D - 4N5TI Sputtering Coating Disc
  • Honeywell RM7840E1016 - SER. 3 REV. 4141 120VAC 15SEC NSMP
  • Honeywell C7012E1120 - Brand new Fast shipping via DHL
  • Honeywell MU-PSIM11 - 1PCS card Brand New Expedited Shipping
  • Honeywell DPR500 - Brand New Fast Shipping FedEx or DHL
  • Honeywell 2108B2101N - Gas Detector OPTIMA PLUS-UL-HC
  • Honeywell 51403578-100 - Rev F Operator Keyboard 1x Ship By DHL/FEDEX/UPS
  • Honeywell 51403165-400 - ONE industrial computer
  • Honeywell FF-SB12E/R02E-S2/3 - Securitram Pair FF-SB12E02E-S2/3 + FF-SB12R02E-S2/3
  • Honeywell STR12D-21A-1B0AFAAA21BP-1C,DE,MB+XXXX - NSMP
  • Honeywell STR17G-11A-1K0AFCAA21A0-A1,CC,HC,MB,NE,TG,W2,3H+XXXX - NSMP
  • Honeywell TK-FTEB01 - "FTE connection module , 51309512-175 Fast Shipping"