IT in Manufacturing


Providing secure access to ­manufacturing data

March 2014 IT in Manufacturing

The proliferation of industrial Ethernet today is putting manufacturing at risk for inadvertent and deliberate intrusions. Security measures tailored specifically for production environments are imperative for keeping operations protected – and profitable.

Security today is a necessary part of every manufacturing operation that expects to run smoothly, efficiently, safely and profitably. But protecting the industrial environment is far from an easy job. As production equipment and the systems that connect and control it grow increasingly more complex and sophisticated, the measures needed to protect them become more critical as well.

Fuelling these developments in large part is the recent evolution of Ethernet technology from the office enterprise to the industrial environment. Once thought to be insufficiently robust and lacking in functionality, industrial Ethernet (standardised Ethernet communications over a hardened networking infrastructure) has advanced remarkably, becoming, in a few short years, the communications staple of manufacturing and production, of automation and control.

Although it offers many benefits, industrial Ethernet is not without issues, especially in terms of security. It typically must carry signals between devices on a precise, exacting schedule. While standard Ethernet in the office environment may be unharmed by a signal transmission fault, it is a different story in the industrial world. Networks here must be able to withstand harsh and hazardous environments with little margin for error. Downtime caused by a security breach on the manufacturing side – whether it is from an inadvertent or unintentional error or from a deliberate cyber attack – is always expensive and can put assets at risk.

A changing landscape: the genesis of industrial Ethernet

Before the advent of industrial Ethernet, industrial networks were not as susceptible to cyber security incidents as their enterprise brethren. Security flaws inherent initially in enterprise infrastructures made them prime targets of the cyber underworld. However, relying predominantly on such fieldbus network protocols as Foundation fieldbus, Modbus, or Profibus that used proprietary RS-232 or RS-485 serialised communications, industrial networks were essentially closed with minimal connection to the outside world. They were rarely affected by the network vulnerabilities and attacks that plagued enterprise environments. Isolated and independent, the industrial world rarely shared a common communications path with the enterprise environment, and even rarer was the person skilled enough to attack both realms.

When industrial companies began seeking a common networking platform that could be leveraged for office and plant floor alike, Ethernet seemed the likely prospect. In fact, it wasn’t long before Ethernet became the de facto standard for the company striving to modernise its business by incorporating the power of computing into their business models.

Using common protocols over standardised networking equipment brought many advantages to industrial and enterprise networks. Thanks to interconnected enterprise and industrial networks, seamless interoperability from the shop floor to the front office made multi-network connectivity, anytime, anywhere, a reality.

Corporations with multiple geographical locations could be united as if in a single building. Multifaceted organisational and commercial entities could more easily collaborate, simplifying intersystem relationships. Yet these advantages are the very cause of the vulnerabilities and weaknesses that expose industrial networks to many of the same security woes of the enterprise network. In some cases, even more.

Web exlusive: to find out more about the Belden’s approach to protecting the industrial operation through defence-in-depth security, visit http://instrumentation.co.za/+C18686

For more information contact Greg Pokroy, Jaycor International, +27 (0)21 447 4247, [email protected], www.jaycor.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
Protecting industrial networks with resilient defence
RJ Connect IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...
Bombardier expands adoption of Siemens Xcelerator for aircraft developmen
Siemens South Africa IT in Manufacturing
Bombardier has expanded its adoption of the Siemens Xcelerator portfolio of industry software for aircraft development.

Read more...
The DeepSeek effect: navigating AI’s new frontier
IT in Manufacturing
DeepSeek has emerged as a game-changer in artificial intelligence, offering a robust platform redefining how businesses approach AI integration. This change is especially important since it opens up AI to a wider range of organisations, including small and medium-sized enterprises that could have previously been priced out of the market.

Read more...