cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Showing results for 
Search instead for 
Did you mean: 

Secure Industrial Visibility for Machine Manufacturers

Tmetcalf
Emeritus

Secure Industrial Visibility for Machine Manufacturers

All present and future connected IoT devices typically consist of hardware (sensors, processors, connectivity chips, etc) as well as software components. In the back end, the corresponding big data analytics and business logic can convert the collected data into meaningful service offerings. Customers who are interested in these services are looking for smartphone apps with an application management platform for an exciting user experience. Three critical success factors are required to provide such services: Flexible connectivity to collect the data from the edge, trusted digital identities for devices and users and the security to protect the exchange of valuable information from the device and allow secure software update and maintenance.  In order to keep up with future demands, production processes need to become intelligent, efficient, and sustainable. That is the reason why production is going digital – and security will become a key requirement. Globally connected industrial production systems must secure the interaction between people, machines, production control systems, and entire factories. Access and policy rights need to be managed, core assets such as intellectual property and product- and process-specific know how must be protected. That’s why G&D’s systems are based on unique identities for every connected machine or set of machines, enabling only authorized entities to take control and exchange data or submit commands. G&D’s Secure Industrial Visibility solution enriches the PTC ThingWorx /Axeda IoT ecosystem with scalable security solutions to support industry IT with high-end security as well as future-proof machine service and maintenance for existing and future machinery. It complies with all different requirements within the production environment and secures communication with and between machines. The main use cases comprise remote diagnostics and monitoring, remote maintenance, system update, performance reports and performance management.

0 REPLIES 0