Our digital world puts every building at risk — even if your systems aren’t connected. That’s why cybersecurity is for every environment, whether a small business with just one building or a major corporation with high-rise towers and suburban campuses.
Johnson Controls provides industry-leading cyber resilience at any scale — always with the same proven approach that applies our standards-based policies and global knowledge to:
We protect the integrity of your information — as well as that of your customers and employees — from unauthorized disclosure, alteration, access, and unlawful destruction with capabilities that include:
We provide secure products — software, hardware, and hosted solutions — that we design, source, develop, deploy, support, and refresh throughout their lifecycles with capabilities that include:
We guard our customer’s privacy with a Privacy by Design program that is involved through all process, product and service development stages.
We follow the most stringent global privacy and data protection laws in mind including:
To learn more please visit our privacy page.
For everything from asking a question to raising an alarm, please use this form for a quick response from our Johnson Controls cybersecurity organization.
If you are aware of a potential security vulnerability in a Johnson Controls product, service or solution, or have a product security question, please contact us at productsecurity@jci.com.
Please use a downloadable PGP key to secure communications.
When submitting a concern, please include the following information:
Thanks to all who partner with us to create a smarter, safer, more sustainable world.
Johnson Controls tracks, identifies and proactively addresses ever-evolving cybersecurity threats every day – it’s a top priority. This commitment is reflected in our technology innovations and continual product development to keep building management systems, IT infrastructures, and connected equipment secure.
Our dedicated cybersecurity team works with local professionals to address your concerns and immediate threats to system security. We encourage a partnership that follows best practices for IT security.