IT in Manufacturing


Embracing security as a core component of your technology

May 2024 IT in Manufacturing

ABI Research recently undertook a comprehensive study to learn more about the product security assurance landscape from the perspective of enterprise customers, surveying 302 enterprise customers and conducting in-depth interviews, to complement the qualitative survey.

Due to the rapidly-evolving cybersecurity landscape, and the effort by hostile actors to find and exploit reported software and hardware vulnerabilities, companies are facing more sophisticated threats. While IT departments are using security assurance to help secure their systems, technology vendors are applying enhanced security assurance practices to proactively improve the resilience of their products and their responses when a security vulnerability is found in a product. Product security assurance spans both hardware and software, consisting of people, practices, and processes that act as the first line of defence in any technology system. Systems, after all, are only as good as the components they are made of. Vendors must take a layered approach to product security assurance, and invest in the personnel and processes, in addition to the technologies to embed security throughout operations and product development lifecycles.

Security assurance is proving to be particularly vital in the chipset industry. Device supply chains are becoming more complex, raising concerns about counterfeiting, data exposure, and component substitution. Enforcing standards and regulations has, therefore, become challenging due to the lack of full transparency and visibility in the supply chain. As a result, demand is growing for holistic product security assurance frameworks that instil high levels of confidence in customers.

A survey of 302 enterprise customer-based respondents was conducted by ABI Research to gain insight into how they view the product security assurance of the technology equipment they are purchasing. It delved into the issues, concerns and priorities enterprise customers have regarding the security of the IT equipment they are purchasing. A mature secure development lifecycle (SDL), bug bounty programs, well-structured internal product security training, and industry engagement are critical processes for implementing security assurance and compliance requirements into all stages of product development. These areas were raised as important distinguishing factors for a strong security posture in the survey. Some of these practices, like SDL, were also seen as the capability that needed the most improvement and transparency from technology vendors.

A recurring theme that surrounded these conversations was the growing concern about data security, particularly in the cloud. The evolution of artificial intelligence and machine learning, and their adoption in cybersecurity was also discussed, though it was viewed that regulatory intervention will be required to unlock their full potential. Overall, there was a consensus among both technology vendors and enterprise customers that the individual is central to security-driven processes. The value of adopting a security-first mindset throughout the product development process was recognised and appreciated. Enterprise customers also recognised that there was no one solution for security assurance. Overall, this underscores that every industry has different requirements and demands, so security issues vary by organisation. Technology vendors providing products into every industry in the market must find a way to provide security for the most sensitive industries, while also prioritising performance for other more general industries.

To access the full whitepaper visit https://www.instrumentation.co.za/ex/abi_security.pdf

For more information contact ABI Research, +1 516 624 2500, [email protected], www.abiresearch.com




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.

Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.

Read more...
Siemens elevates automotive and aerospace simulation
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software has announced the latest update to its Simcenter portfolio, delivering advancements in aerostructure analysis, electric motor design, gear optimisation and smart virtual sensing. These enhancements are designed to streamline workflows, accelerate certification and provide deeper insights into system performance.

Read more...
Automation in 2025: Navigating manufacturing innovation without the risk
IT in Manufacturing
During 2025, a wave of innovative technologies is expected to disrupt and change the way IT is applied to automation systems. The challenge lies in balancing the reliability of proven techniques with the potential of new technologies, all while minimising and controlling risk. This article explores ways to approach the latest information technologies effectively in a manufacturing context.

Read more...
South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...