IIoT
Bridging the gap between HART devices and the IIoT
January 28, 2019
With the acceptance of industrial Ethernet backbones and wireless networks, IIoT HART interface devices with built-in security measures, open industry protocols and ease of programming provide a quick, easy and seamless way to share process data with the entire corporate infrastructure.
New IETF standards: where IT security meets OT security
January 28, 2019
Two developing IT-based, IETF standards are aiming at helping to automate and simplify deployment of security processes for Industrial Automation and Control (IAC) devices and networks, as they become operational in machine builder, customer or system integrator’s processes.
Encryption technology provides solutions for Ethernet security
January 28, 2019
Cyber security is a considerable issue in the Industrial Networking that is demanding more and more attention. The IEEE 802.1AE standard, MACSec, is an efficient and high cost-performance ratio solution for Ethernet links to prevent “Man in the Middle” attacks and external threats from frame tampering.
Five reasons IoT applications need fog computing
November 28, 2018
Industry experts have warned that cloud-computing models in today’s IoT systems are ill-equipped to deal with the data generated by the billions of IoT devices slated to go online. Devices generate data in a multitude of formats and a variety of protocols, making their acquisition and real-time processing difficult.
Connectivity considerations in designing IIoT networks
September 10, 2018
Many businesses around the world are developing strategies on how to embrace new trends such as globalization and digitization. As these trends continue to affect businesses more and more, they need to address the changes these trends are causing in order to stay competitive and profitable.
Optimising automation with IIoT information
September 10, 2018
As manufacturing companies strive for higher Overall Equipment Effectiveness (OEE), the emerging trend driven by the IIoT technologies to collect and utilize useful feedback from a machine, or from an entire manufacturing line, can be critical to unlocking the potential of the equipment.
Benefits of IIoT and Industry 4.0 for secure remote connectivity
July 10, 2018
Combining IIoT and Industry 4.0 with cyber secure remote access represents the next wave of innovation and considerable operational advantages. A comprehensive secure remote access platform can minimize risks and costs while maximizing the rewards, such as increased efficiencies, and timely responses.
ICS cyber security guide: industrial control systems
July 10, 2018
Five stages can be used to protect industrial networks, beginning with implementing a defense-in-depth strategy for industrial control systems. These stages (discover, assess, act, monitor and maintain) create a roadmap and detailed checklist to maintain the highest levels of security.
Designing industrial networks from a security point of view
July 10, 2018
Addressing security during the initial phase of network design is an important step towards creating more secure industrial control systems. Discarding outdated architectures in favor of granular network zones limits an attacker’s freedom of movement within a network and protects critical or vulnerable devices.
Mobile technology is automation’s new normal
July 10, 2018
Industrial automation has traditionally been built using dedicated and fixed-in-place HMIs, but operator interfaces through mobile devices are the new normal. Remote system access, rich displays and diagnostics offer convenience, cost effectiveness, and help businesses become more efficient and competitive.