IT in Manufacturing


Meeting cybersecurity challenges in a connected world

September 2018 IT in Manufacturing

As business embraces the digital revolution through new technologies, such as cloud computing and the IoT, barriers are broken down to allow for growth and advancement. However, this opening up of platforms and increase in interconnected systems makes it easier for cyber criminals to enter and attack systems.

The necessity for a comprehensive security strategy is now acknowledged as an integral part of standard operational risk management, particularly in such industries as oil and gas, electrical power plants, water and other key sectors. The disruption of operational systems can have a far-reaching and potentially catastrophic impact, but special skills are needed to fortify defences, while keeping plants running smoothly.

A 2015 survey by Ernst & Young revealed that 88% of respondents do not believe their information security fully meets the organisation’s needs and that 57% say the lack of skilled resources is challenging information security’s contribution and value to the organisation.

Managing cybersecurity

As a global technology solutions leader, Schneider Electric has vast industrial experience working with both Information Technology (IT) and Operational Technology (OT). This experience enables it to collaborate with IT departments and third-party security solutions providers to develop precise and effective cybersecurity solutions that secure systems without hampering operational efficiency.

Managing cybersecurity requires experts to be well versed with foundational knowledge of the systems they are working to protect. Having worked closely with clients to help plan and set up many of these control systems, Schneider Electric’s cybersecurity team has gained deep knowledge and insight into what it takes to protect the safety, reliability and confidentiality of these OT systems.

Their familiarity with the system architecture enables quicker identification of security risks and implementation of more targeted solutions, thus preventing wastage and plant downtime. It combines cybersecurity expertise with technical and consulting knowhow in a ‘defence in depth’ strategy to prevent or minimise cyber-attacks. This multi-pronged defence system adheres to IEC 62443 standards, and involves the creation of a multi-layered and multi-technology strategy to safeguard critical systems. This strategy is an implementation tool and a holistic security approach, which safeguards but also assesses, manages and monitors systems with the help of Schneider Electric’s Portfolio Life Cycle Methodology.

The cybersecurity team will assess, design, implement, monitor and maintain cybersecurity systems and train customer teams in security practices and a security culture that leads to quick threat response and business continuity.

For more information contact Prisca Mashanda, Schneider Electric SA, +27 11 254 6400, [email protected], www.schneider-electric.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Platform for integrated digital mine management
IT in Manufacturing
Becker Mining launches platform for integrated digital mine management

Read more...
Advanced process control for the IRP
Schneider Electric South Africa Electrical Power & Protection
One of the main challenges in implementing South Africa’s Integrated Resource Plan is ensuring grid stability while integrating renewable energy sources and balancing fluctuating energy demands. Advanced process control can play an important role.

Read more...
The reimagined building of today and tomorrow
Schneider Electric South Africa IT in Manufacturing
Retrofitting a building is a truly practical way of achieving energy efficiency, compliance and long-term competitiveness.

Read more...
The Konecranes portal, a benchmark in data supply
IT in Manufacturing
The newly launched Konecranes Portal takes online communications to the next level through its single point of access to its digital customer platforms.

Read more...
End-to-end security across IT and OT environments
IT in Manufacturing
Siemens is collaborating with Accenture to offer 24/7 managed IT/OT security operations centre services, providing end-to-end security across IT and OT environments.

Read more...
Mitigating cybersecurity threats
IT in Manufacturing
Wesco is a world leader in electrical, communications and utility distribution and supply chain services and a member of the Rockwell Automation PartnerNetwork programme. To build their cybersecurity portfolio, Wesco turned to two Rockwell Automation offerings, a security posture survey and threat detection services.

Read more...
MRO inventory optimisation
RS South Africa IT in Manufacturing
Maintenance, repair and operations inventory optimisation is not just a technical concern, it is a strategic priority for industries that depend on operational reliability and efficiency.

Read more...
Liquid cooling solutions for hyperscale data centre environments
Schneider Electric South Africa IT in Manufacturing
Schneider Electric has unveiled its world-leading portfolio of end-to-end liquid cooling solutions for hyperscale, colocation and high-density data centre environments, engineered to enable the AI factories of the future.

Read more...
Corrosion in data centre cooling systems
IT in Manufacturing
Taking proactive steps to fight corrosion is critical to maintaining healthy cooling towers alongside data centres.

Read more...
Smart assistant supports troubleshooting and analyser maintenance
IT in Manufacturing
The Siemens Industrial Copilot for process analyser technology is a smart, offline assistant that supports technicians in troubleshooting and maintaining analysers.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved