IT in Manufacturing


Meeting cybersecurity challenges in a connected world

September 2018 IT in Manufacturing

As business embraces the digital revolution through new technologies, such as cloud computing and the IoT, barriers are broken down to allow for growth and advancement. However, this opening up of platforms and increase in interconnected systems makes it easier for cyber criminals to enter and attack systems.

The necessity for a comprehensive security strategy is now acknowledged as an integral part of standard operational risk management, particularly in such industries as oil and gas, electrical power plants, water and other key sectors. The disruption of operational systems can have a far-reaching and potentially catastrophic impact, but special skills are needed to fortify defences, while keeping plants running smoothly.

A 2015 survey by Ernst & Young revealed that 88% of respondents do not believe their information security fully meets the organisation’s needs and that 57% say the lack of skilled resources is challenging information security’s contribution and value to the organisation.

Managing cybersecurity

As a global technology solutions leader, Schneider Electric has vast industrial experience working with both Information Technology (IT) and Operational Technology (OT). This experience enables it to collaborate with IT departments and third-party security solutions providers to develop precise and effective cybersecurity solutions that secure systems without hampering operational efficiency.

Managing cybersecurity requires experts to be well versed with foundational knowledge of the systems they are working to protect. Having worked closely with clients to help plan and set up many of these control systems, Schneider Electric’s cybersecurity team has gained deep knowledge and insight into what it takes to protect the safety, reliability and confidentiality of these OT systems.

Their familiarity with the system architecture enables quicker identification of security risks and implementation of more targeted solutions, thus preventing wastage and plant downtime. It combines cybersecurity expertise with technical and consulting knowhow in a ‘defence in depth’ strategy to prevent or minimise cyber-attacks. This multi-pronged defence system adheres to IEC 62443 standards, and involves the creation of a multi-layered and multi-technology strategy to safeguard critical systems. This strategy is an implementation tool and a holistic security approach, which safeguards but also assesses, manages and monitors systems with the help of Schneider Electric’s Portfolio Life Cycle Methodology.

The cybersecurity team will assess, design, implement, monitor and maintain cybersecurity systems and train customer teams in security practices and a security culture that leads to quick threat response and business continuity.

For more information contact Prisca Mashanda, Schneider Electric SA, +27 11 254 6400, prisca.mashanda@schneider-electric.com, www.schneider-electric.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

SA Food Review
IT in Manufacturing
Food Review is a monthly trade journal for South Africa’s food and beverage manufacturing industry, for industry professionals seeking detailed information on trends, technologies, best practices and innovations.

Read more...
Keeping an eye on oil consumption with moneo
ifm - South Africa IT in Manufacturing
Manufacturing companies in the metal industry need oils and other fluids that are consumed by their machines. To make this consumption transparent and to establish a link to the ERP system, Arnold Umformtechnik relies on the IIoT platform, moneo, in combination with the SAP-based software solution Shop Floor Integration (SFI) – both from ifm.

Read more...
AI accelerates energy transformation
RJ Connect IT in Manufacturing
With the rapid expansion of generative AI applications, data centre power demand is reaching unprecedented levels.

Read more...
Revolutionising mining operations with MineOptimize
IT in Manufacturing
Now more than ever, mining and mineral processing companies need to boost productivity, ensure safety, and protect the environment. ABB’s comprehensive electrification, automation and digital solutions portfolio is ideally positioned to meet these challenges across all mining processes, from mine to port, transforming performance in a digital world.

Read more...
Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
TwinCAT Vision functionality extended
Beckhoff Automation IT in Manufacturing
The image processing and camera integration capabilities of Beckhoff’s TwinCAT 3 Vision software have been expanded.

Read more...
Automation software to future-proof your operations
Adroit Technologies IT in Manufacturing
As the official partner of Mitsubishi Electric Factory Automation, Adroit Technologies empowers businesses with cutting-edge solutions that reduce costs, improve quality and increase productivity.

Read more...
Siemens automation portfolio, your bridge to the industrial metaverse
Siemens South Africa IT in Manufacturing
Step into the future with Siemens’ automation portfolio, your bridge to the industrial metaverse. Our cutting-edge solutions integrate AI, digital twins and real-time simulation, driving smarter, more efficient production.

Read more...
Transform your manufacturing efficiency
TransLution Software IT in Manufacturing
MÄDLER offers a wide range of gears in various materials, modules and designs, available directly from stock.

Read more...
Prevent cyber attacks
RJ Connect IT in Manufacturing
The EDR-G9010 Series delivers advanced industrial networking with multi-port secure routing, firewall/NAT/VPN, and managed Layer 2 switching.

Read more...