IT in Manufacturing


Meeting cybersecurity challenges in a connected world

September 2018 IT in Manufacturing

As business embraces the digital revolution through new technologies, such as cloud computing and the IoT, barriers are broken down to allow for growth and advancement. However, this opening up of platforms and increase in interconnected systems makes it easier for cyber criminals to enter and attack systems.

The necessity for a comprehensive security strategy is now acknowledged as an integral part of standard operational risk management, particularly in such industries as oil and gas, electrical power plants, water and other key sectors. The disruption of operational systems can have a far-reaching and potentially catastrophic impact, but special skills are needed to fortify defences, while keeping plants running smoothly.

A 2015 survey by Ernst & Young revealed that 88% of respondents do not believe their information security fully meets the organisation’s needs and that 57% say the lack of skilled resources is challenging information security’s contribution and value to the organisation.

Managing cybersecurity

As a global technology solutions leader, Schneider Electric has vast industrial experience working with both Information Technology (IT) and Operational Technology (OT). This experience enables it to collaborate with IT departments and third-party security solutions providers to develop precise and effective cybersecurity solutions that secure systems without hampering operational efficiency.

Managing cybersecurity requires experts to be well versed with foundational knowledge of the systems they are working to protect. Having worked closely with clients to help plan and set up many of these control systems, Schneider Electric’s cybersecurity team has gained deep knowledge and insight into what it takes to protect the safety, reliability and confidentiality of these OT systems.

Their familiarity with the system architecture enables quicker identification of security risks and implementation of more targeted solutions, thus preventing wastage and plant downtime. It combines cybersecurity expertise with technical and consulting knowhow in a ‘defence in depth’ strategy to prevent or minimise cyber-attacks. This multi-pronged defence system adheres to IEC 62443 standards, and involves the creation of a multi-layered and multi-technology strategy to safeguard critical systems. This strategy is an implementation tool and a holistic security approach, which safeguards but also assesses, manages and monitors systems with the help of Schneider Electric’s Portfolio Life Cycle Methodology.

The cybersecurity team will assess, design, implement, monitor and maintain cybersecurity systems and train customer teams in security practices and a security culture that leads to quick threat response and business continuity.

For more information contact Prisca Mashanda, Schneider Electric SA, +27 11 254 6400, prisca.mashanda@schneider-electric.com, www.schneider-electric.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Real-time modelling is the key to a resilient, bi-directional energy future
Schneider Electric South Africa Electrical Power & Protection
South Africa’s electrical grid is a classic example of a traditional power system, designed for one-way energy flow. This linear model worked well for decades. Today, however, it is being fundamentally disrupted, as South Africa’s ongoing energy crisis has sparked large-scale investment in distributed energy resources.

Read more...
Green IT practices: cutting costs while saving the planet
IT in Manufacturing
Sustainable IT practices are proving that companies can reduce their carbon footprint and operating costs simultaneously. The financial benefits are significant, offering a promising outlook for businesses.

Read more...
Coolant distribution unit for high-density data centres
Schneider Electric South Africa IT in Manufacturing
Motivair by Schneider Electric has introduced a new, industry-leading 2,5 MW coolant distribution unit designed to cool high-density data centres reliably and at scale.

Read more...
Data protection is the first line, recovery is the lifeline
IT in Manufacturing
Many businesses only realise the importance of data protection after experiencing system failures or data loss. The 3-2-1-1 backup model is a proven approach for safeguarding data.

Read more...
Cyber resilience moves from IT issue to board risk
IT in Manufacturing
Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely.

Read more...
Cybersecurity in South Africa
IT in Manufacturing
For cyber risk in South Africa the question is not ‘if’ but ‘when’.

Read more...
Sustainable aviation fuel
Siemens South Africa IT in Manufacturing
Siemens and the cleantech company CAPHENIA have entered a partnership to scale the production of sustainable aviation fuel.

Read more...
Using AI to solve South Africa’s biggest challenges
IT in Manufacturing
Unlike global superpowers that invest heavily in sheer compute capacity, South Africa doesn’t need to be the largest computing market to lead in innovation. What matters today is how we apply computing to accelerate insight, discovery and socio-economic progress.

Read more...
Unearthing AI’s real value in African mining
IT in Manufacturing
At Mining Indaba 2026, where miners and technology innovators explored how partnerships are turning AI’s potential into meaningful operational impact. For Siemens, the answer begins with a clear-eyed view of what AI can and cannot do, and a commitment to deploying it where it matters most - keeping people safe.

Read more...
Digital innovations reshaping the future of mining in Africa
IT in Manufacturing
Africa’s mining sector is stepping into a new era, driven by the accelerating pace of digital transformation. Digital tools are making operations smarter, safer and more efficient, laying the groundwork for a more competitive and sustainable industry.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved