Unleash the full potential of the Industrial Digital Transformation for IIoT, Robotics and OT. |
Posted: July 5, 2019 |
--[ Cybersecurity complements industrial quality and safety requirements Manufacturing technologies undergo massive and rapid moves with new data exchanges and automation. 3D printing, robotics and the new cyber physical systems (CPS), Industrial Internet of Things (IIoT), Artificial Intelligence and cognitive computing, cloud services and operational processes (OT)… they all contribute to shape the 4th industrial revolution. This industry 4.0 relies on high connectivity, new software building blocks and a fundamental change in organizing how data is shared, how systems are controlled and how processes are delivered. Quality and safety have always been critical parameters of manufacturing. With new open systems, software-based solution and high connectivity, cybersecurity should become the 3rd pillar to prevent, manage and remediate the new risks. --[ Cybersecurity DNA Cybersecurity consists in managing and mitigating risks due to external or internal attacks. In the manufacturing ecosystem this can be improved in 2 ways. Security can be a new layer to balance the unwanted effects of open and interconnected systems. Basically, it is a perimetric security for critical assets, often based on firewalls, and intrusion prevention or detection systems. This can be a good solution when new assets such as IIoT, Robots, and IT platforms have already been deployed. However, this solution can be insufficient and ineffective when it comes to secure new firmware and new software technologies. The second approach is to foster built-in security right from the start and before the effective deployment of a new manufacturing solution. Industries are used to measure the safety and quality of any new component entering their environment right from the purchasing process. Cybersecurity should become part of the DNA of their new systems. --[ How to measure and improve built-in security? Moabi analyzes software – firmware, OS, application – from their binaries (the machine code) and gets their level of security represented by their Defense Surface which shows precisely the strengths and weaknesses of this software (or group of software corresponding to a global platform or a full project for IoT security). Is the software designed with the latest and most updated tools in terms of security? Is defense-in-depth at the right level? Does it use weak ciphers that would expose the security of the solution? Does the supplier enforce code standards for optimized security? Is there any known vulnerability or can Moabi discover new 0Days? Moabi not only answers to all these questions but also identifies the most critical software to prioritize further analysis and uncovers software with deliberate obfuscation that may hide a malware. --[ Select new IIoT, CPS, Robots and other equipment with consistent cybersecurity criteria With Moabi, industrials obtain the relevant analytics to assess and test any new systems and equipment in order to compare suppliers for a given project. In the selection process, they have the communication tools to challenge their suppliers on their security level and raise their security awareness. In the project phase, they can push cybersecurity actionable reports to their suppliers to improve their security level. Once the project is ready for launch, they have the right level of information to prepare the adapted security actions to protect their operation. Ensure secured industrial transformation to reap its full benefits Moabi fosters Industry 4.0 built-in cybersecurity so that security becomes a standard product criterion like quality and safety.
|
||||||||||||||||
|