Welcome to Our Resource Center
Protecting your smart building is a collaborative process. The better you understand cybersecurity threats and best practices, the more productively we can work with you to mitigate risk.
That’s why we share new guidelines and product information with you. These updates are based on our own analysis of the threat landscape — as well as input from international government agencies and industry peers. When we’re all working together, we improve cybersecurity for everyone.
-
Johnson Controls Cybersecurity
-
Digital Services and Solutions
-
Controls / HVAC
-
Security
-
Fire
Related Items
How can we help you?
For everything from asking a question to raising an alarm, please use this form for a quick response from our Johnson Controls cybersecurity organization.
Report a potential vulnerability or cybersecurity concern | Ask about Products and Services | Learn about protecting your smart building
If you are aware of a potential security vulnerability in a Johnson Controls product, service or solution, or have a product security question, please contact us at productsecurity@jci.com.
Please use a downloadable PGP key to secure communications.
When submitting a concern, please include the following information:
- Complete product name and version
- Description of the concern or the potential vulnerability and the steps necessary for our staff to reproduce
- A brief description of the potential impact
- A reliable method to contact you
- Supporting documentation, if available
Thanks to all who partner with us to create a smarter, safer, more sustainable world.
Product Security Advisories
Johnson Controls tracks, identifies and proactively addresses ever-evolving cybersecurity threats every day – it’s a top priority. This commitment is reflected in our technology innovations and continual product development to keep building management systems, IT infrastructures, and connected equipment secure.
Our dedicated cybersecurity team works with local professionals to address your concerns and immediate threats to system security. We encourage a partnership that follows best practices for IT security.