IT in Manufacturing


Yokogawa’s cybersecurity solutions for the plant of the future

September 2018 IT in Manufacturing

The evolution of the process control network from individual isolated computers with proprietary operating systems and networks, to interconnect various systems and applications employing commercial-off-the-shelf technology, has led to the full integration of process control networks with business enterprise systems and other applications through various communication networks. This is known as “the plant of the future”.

The benefits of such network and system integration include:

• Increased visibility of process control network activities (work in progress, equipment status, product schedules) integrated with processing systems from the business level. This contributes to capability improvements through analysis, which drive down costs and improve productivity.

• Integrated manufacturing and production systems that have more direct access to business level information, thus enabling a more responsive enterprise.

• A common interface, resulting in a reduction of overall support costs by permitting remote access to production processes.

• Remote monitoring of the process automation system which results in reduced support costs, allowing for quick, effective problem resolution.

Plant of the future characteristics

“The plant of the future will only have two employees: a man and a dog. The man will be there to feed the dog. The dog will be there to keep the man from touching the equipment.” Warren G. Bennis.

As the quote points out, the plant of the future will have very specific characteristics which are different from that of current plants.

These include:

• Agility and flexibility: the supply chain will be fully synchronised for optimal asset utilisation.

• Synchronisation of business and plant systems.

• Autonomous operations: nearly unmanned; event prediction mitigation; intervention by exception; integrated control and safety systems.

• Be information driven: connected systems with access from anywhere to information and context.

• Asset performance management: optimised operating performance; predictive and prescriptive alerts; highly integrated operations and maintenance.

The biggest challenge facing the plant of the future will be continuous security of the information flow.

Continuous security concept

The security demands currently being made by the process control customer differ from those of classic plant security. Integration with open systems, using the latest technology devices and networks, is now a requirement. Due to fast changing technology, the possibilities are unlimited and plant security needs to cope with and address any known issues and vulnerabilities.

Just as control system technologies are constantly evolving, security risks, including attack techniques, are evolving just as fast. Attacks targeting industrial control systems have been increasing at an alarming rate. Once off deployment of security controls is insufficient to mitigate these risks. A service lifecycle solution for cybersecurity is required to ensure that the security measures and deployment are continuously enhanced, monitored and inspected.

Yokogawa’s cybersecurity lifecycle solutions

Plant security lifecycle service: Yokogawa’s cybersecurity approach has four phases, starting with an assessment of the system and ending with a validation of the security controls. This approach ensures that the design and implementation are specific not only for the industry, but for each customer’s unique environment.

Phase 2: design and Implementation – deployment and enhancement of optimal security controls.

Phase 3: operational support – provision of security training, regular security updates and continuous security monitoring. Support for security incident response and prompt recovery from incidents.

Phase 4: validation support – periodic security audit plus analysis and review of security controls.

Conclusion

For more than a decade, Yokogawa has developed and provided proprietary cybersecurity solutions and technology for its customers. During this time, the Industrial Cyber Security Group has gained invaluable experience and knowledge from various projects undertaken around the world. The company is therefore in a prime position to co-innovate with customers wanting to minimise security risks and maximise corporate value.

For more information contact Christie Cronje, Yokogawa South Africa, +27 11 831 6300, [email protected], www.yokogawa.com/za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Enhancing cyber security for industrial drives
Siemens South Africa IT in Manufacturing
The growing connection between production networks and office networks as part of IT/OT integration and the utilisation of IoT have many benefits for industrial companies. At the same time, they also increase the risk of cyber threats. Siemens ensures that your know-how and plants are protected at all times.

Read more...
Immersion cooling systems for data centres
IT in Manufacturing
The demand for data centres in Africa is growing. The related need for increasing rack densities brings with it escalating cooling requirements.

Read more...
Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
Protecting industrial networks with resilient defence
RJ Connect IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...