IT in Manufacturing


How secure is the smart factory?

Technews Industry Guide: Industrial Internet of Things & Industry 4.0 IT in Manufacturing

Industry 4.0, IIoT and the connected factory are beyond the point of just being buzzwords. In reality, they offer huge opportunities for manufacturers. But as a smart factory goes online, how secure are communications in and out of the site? How can companies enable remote access and protect themselves against cyber threats at the same time?

Remote access to machines has become vital for OEMs and system integrators to meet response-time and up-time obligations. Engineering resources and budgets are limited, therefore efficiency is key. Resolving issues without the need for onsite visits saves time and money, but as businesses embrace connectivity, the threat of a cyber attack increases. Protecting data when connected to a network can be a complicated challenge.

Cyber security is top priority for the Danish solution, Secomea. Designed specifically for remote programming, monitoring and data-logging, it provides secure remote access without the need for advanced firewall configuration.

Moving on from VPN

Traditional VPN technology is widely used and suits the job of connecting networks remotely or providing remote access to a central site. However, it has some serious limitations for remote device monitoring and management.

VPN solutions can be complex. Connecting different engineers to different sites around the world by traditional VPN solutions would be an onerous task. Setting up a VPN is resource heavy, time consuming and requires the involvement of IT personnel. Subnet conflict issues, firewall setups and single level authentication can also trigger security concerns.

Secomea has developed an Internet-based technology that specifically addresses the security and usability requirements of linking service engineers with industrial equipment.

Each machine has a SiteManager, a small piece of hardware that the engineer connects to and uses to control the machine. The SiteManager can connect to industrial equipment via LAN, serial or USB ports. There are also multiple Internet access options including LAN, 3G and 4G or Wi-Fi. The LinkManager Windows based client provides (VPN-like) access to serial and USB devices, no configuration is required. A web version, the LinkManager Mobile, can be operated from multiple platforms with a browser allowing users to remotely access equipment via a phone or tablet.

The solution also includes a GateManager, a M2M server that is either hosted by Secomea, or by the customer themselves. All communication between the factory and the engineer through GateManager is via an encrypted connection. Through the web-based GateManager Portal, users can administer accounts, manage SiteManagers, and also manage devices. It is straightforward to determine who has access, what equipment and which sites can be accessed, and also when and for how long that access remains active. The engineer can securely log on to the system via a X.509 certificate and associated password. GateManager also logs all events.

Secomea has two- and three-factor security authentication, event audit trails, role-based account management and standard measures for eliminating the risk of vulnerabilities from configuration or human errors.

Future-proofing

Secomea says it has achieved Industry 4.0 certification by enabling these connections in a secure way. Unlike an open VPN network, restricting access to certain devices for a specified time is easily achieved using a simple folder, and drag and drop system.

The development of smart factories offers significant benefits for the automation industry. If companies are to take full advantage, they must make timely decisions about how to utilise new technology that is designed to keep those connections secure.

Secomea has not only made its system secure, it has also utilised third-party test laboratories to assess its system and ensure they comply fully with the requirements of Industry 4.0. Unfortunately we live in an age where criminals, fraudsters and hackers have upped their cyber game. No one can afford vulnerabilities in their system.

New technologies afford many benefits, but they need to be kept secure and stay ahead of the threats.

For more information contact Bob Petrie, Throughput Technologies, +27 (0)11 705 2497, [email protected], www.throughput.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Transforming battery manufacturing processes
IT in Manufacturing
Siemens and Hirano Tecseed, a Japanese machine builder, are partnering to transform battery manufacturing processes.

Read more...
From Trojan takeovers to ransomware roulette
IT in Manufacturing
Cisco’s Cyber Threat Trends Report offers a comprehensive and overview of the evolving cybersecurity landscape, leveraging its vast global reach through the analysis of DNS traffic.

Read more...
The road to decarbonisation in mining
IT in Manufacturing
The mining industry is a key player in global carbon emissions, and ABB’s eMine is at the forefront of efforts to drive the sector’s decarbonisation.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Siemens’ PAVE360 to support new Arm Zena Compute Subsystems
IT in Manufacturing
Siemens Digital Industries Software is expanding its longstanding relationship with Arm and adding support for the newly launched Arm Zena Compute Subsystems in its PAVE360 software, designed for software-defined vehicles

Read more...
Empowering OEMs in industrial automation
Schneider Electric South Africa IT in Manufacturing
Organisations are increasingly focusing on empowering OEMs within the industrial automation sector

Read more...
Fortifying the state in a time of cyber siege
IT in Manufacturing
In an era where borders are no longer physical, South Africa is being drawn into a new kind of conflict, one fought not with tanks and missiles, but with lines of code and silent intrusions. The digital battlefield is here, and cyber space has become the next frontier of conflict.

Read more...
Levelling up workplace safety - how gamification is changing the rules of training
IT in Manufacturing
Despite the best intentions, traditional safety training often falls short, with curricula either being too generic, too passive, or ultimately unmemorable. Enter gamification, a shift in training that is redefining how businesses train for safety and live by those principles.

Read more...
Reinventing data centre design: critical changes to meet surging
Schneider Electric South Africa IT in Manufacturing
AI technologies are pushing the boundaries of what is possible which, in turn, is presenting data centres with a whole new set of challenges. Fortunately, several options are emerging which include optimising design and infrastructure for efficiency, cooling and management systems

Read more...
Watts next - can IT save the planet
IT in Manufacturing
The digital age’s insatiable demand for computing power has collided with an urgent and pressing need for sustainability. As data centres and AI workloads consume unprecedented energy, IT providers are pivotal in redefining how technology intersects with environmental stewardship.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved