The growing connection between production networks and office networks as part of IT/OT integration and the utilisation of the Internet of Things have many benefits for industrial companies. These include digitalised processes and cross-company collaboration in ecosystems. At the same time, they also increase the risk of cyber threats. One of the greatest challenges for a company on its way to becoming a digital enterprise is to handle data optimally and securely at all times.
With Cyber Security for Industry, Siemens enables the comprehensive protection of systems and plants. Relying on the multilayer Defense-in-Depth concept, which is strengthened by Zero Trust principles, Siemens ensures that your know-how and plants are protected at all times
The new Security Event Log simplifies and enhances cyber security for industrial drives. Security events are centrally stored using the Syslog protocol (RFC5424) ensuring their tamper-proof nature and preventing deletion by attackers. This enables effective post-attack analysis and early anomaly detection through cross-device event correlation. Standardised formats for Sinamics drives and Simatic and Sinumerik controllers reduce analysis effort. Secure syslog ensures confidentiality and integrity while enabling seamless IT security integration.
Immersion cooling systems for data centres
IT in Manufacturing
The demand for data centres in Africa is growing. The related need for increasing rack densities brings with it escalating cooling requirements.
Read more...Transforming pulp and paper with automation and digitalisation ABB South Africa
IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.
Read more...Protecting industrial networks with resilient defence RJ Connect
IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).
Read more...The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.
Read more...Electromagnetic flow measurement Siemens South Africa
Flow Measurement & Control
The SITRANS FM electromagnetic flowmeters from Siemens deliver high-precision volume measurement of electrically conductive liquid applications – from water, wastewater and irrigation to hygienic processes and even mining slurries with magnetic particles.
Read more...AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.
Read more...Addressing the cooling needs of the modern data centre Schneider Electric South Africa
IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.
Read more...South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.