industrial control

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Conquering Dataflow Chaos with Data Operations

Published By: StreamSets     Published Date: Sep 24, 2018
Imagine you’re running a factory but without a supply chain management system or industrial controls. Instead, you expect your customers to find and fix your delivery and quality problems. Sound ludicrous? Well, in many enterprises that’s the current “supply chain management” process for big and fast data. It relies on the lightly monitored dumping of unsanitized data into a data lake or cloud store, forcing data scientists and business users to deal with failures from data availability and accuracy issues.
Tags : 
dataflow, operations, factory, industrial
    
StreamSets

Cyber Alert: 7 Strategies to Defend Your Industrial Systems

Published By: GE Power     Published Date: Jan 27, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment, network security, hacker detection, intrusion detection, intrusion prevention, security policies, data protection
    
GE Power

Cyber Alert: 7 Strategies to Defend Your Industrial Systems

Published By: GE Power     Published Date: Jan 31, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security power plants, utilities, power producers, power plant cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
    
GE Power

Cyber Security for Industrial Control Systems: A New Approach

Published By: Darktrace     Published Date: Jun 17, 2019
This white paper discusses Darktrace's Industrial Immune System, a fundamental innovation that views data from an Industrial Control System network in real time, and establishes an evolving baseline for what is normal for operators, workstations and automated systems within that environment.
Tags : 
    
Darktrace

Cybersecurity Solutions: Maintain Defense in Depth with Control and Safety Integration

Published By: Schneider Electric     Published Date: Jun 03, 2019
New digital technology makes it feasible to integrate process control and safety instrumented functions within a common automation infrastructure. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric

Cylance® vs. Traditional Security Approaches

Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance

Defining the Embedded Industry

Published By: WIN Enterprises     Published Date: Dec 01, 2010
Brief white paper to help people understand the definition of the embedded industry
Tags : 
embedded, motherboards, single board computers, sbc, mobile computing, industrial control, embedded systems and networking
    
WIN Enterprises

Digital Transformation Through Integrated Process and Power

Published By: Schneider Electric     Published Date: Jun 03, 2019
Leveraging IIoT advancements, learn how to break traditional barriers between your power and process control systems to solve challenges across the full lifecycle of the plant. Download the white paper to learn more.
Tags : 
power, digital transformation, industrial internal of things, smart control, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, defence in depth, industrial automation, process control, process systems, power and process
    
Schneider Electric

Enabling a Smart Connected Supply Chain

Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
The manufacturing industry has entered a completely new technological realm that did not even exist five years ago. Three industrial revolutions forever changed manufacturing—and the world—and the fourth is now underway. Factories have had to adapt rapidly with the advent of advanced automation and robotics as well as software to manage processes and control. The onset of digital manufacturing accelerates the need for new approaches. While consumers typically embrace disruptive technology with enthusiasm, manufacturers inevitably approach new technology with caution, carefully evaluating how it can improve their businesses. Eventually, however, caution must be replaced with innovation to ensure survival. Those organizations that find themselves on the wrong side of the technology curve today will face increasing challenges to remain competitive as time marches forward.
Tags : 
supply chain management, scm, manufacturing, digital manufacturing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017

Finding The Best PLM to Fit Industrial Equipment Manufacturers

Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Industrial Equipment Manufacturers have to connect closely with customers and introduce new products quickly and efficiently to meet their needs. While smaller Industrial Equipment Manufacturers may be able to control, access, and share product data with relatively simple Product Data Management (PDM) tools, larger Industrial Equipment Manufacturers rely on full-featured PLM systems that help automate processes and share data across global supply chains. Industrial Equipment Manufacturer companies may find themselves in-between because: • Product and organizational complexity drive them beyond basic PDM capabilities • A full-featured PLM implementation may feel out of reach They need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. What’s the right size PLM to fit an Industrial Equipment Manufacturer? Let’s take a look.
Tags : 
pdm, product data management, industrial, equipment manufacturers, plm, dassault
    
Dassault Systèmes

Five Steps to Drive Profitable Industrial Safety

Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial Internet of Things (IIoT) technologies and concepts can transform and enhance process safety practices if appropriately applied. Download the white paper for guidance on leveraging IIoT tools and techniques to deliver industrial safety in a profitable manner.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric

How to Architect “Zero Trust” Network Segmentation in Industrial Control Systems

Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks

How to Integrate Machine Vision into Industrial Systems

Published By: Intel     Published Date: Feb 28, 2019
The confluence of AI and Industry 4.0 is transforming image processing. As image vision becomes widespread, there is an increasing need to transition stand-alone imaging to an integrated driver of automation feeding insights back into the business systems that monitor overall factory performance. Download the whitepaper to learn more about fitting multiple demands into a single platform— • Building an industrial system with advanced functions like machine vision and Industry 4.0 connectivity • Minimizing the footprint of the systems to save space, cost and power consumption • Adhering to principles of long life, safety, reliability, real-time control functionality alongside AI and IIOT capabilities
Tags : 
    
Intel

How to maximise value from Industry 4.0 technologies

Published By: KPMG     Published Date: Jul 10, 2018
The real value of i4.0 comes from the integration of automation, data, analytics, manufacturing and products in a way that unlocks new business and operating models. Are you ready for the next industrial revolution? Read this report to find out: • why deep pockets alone won’t ensure i4.0 success • how to scale up projects and capabilities to drive enterprise-level value • what capabilities, controls and culture are required to support i4.0 success • how to unlock value by integrating smart processes and smart products • how to bring suppliers and value chain players into the i4.0 environment.
Tags : 
    
KPMG

Improve Real-Time Operational Safety and achieve Profitable Safety

Published By: Schneider Electric     Published Date: Jun 03, 2019
The safety of operations can have a direct, positive impact on the operational profitability of the plant. Environmental health and safety (EH&S) can now be viewed not just as a cost center, but as a profit center, and new levels of both safety and profitability can result. Real-time safe profitability is no longer a dream—it is a reality!
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric

Mastering Global Manufacturing with Seamless Digital Continuity

Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Companies that manufacture industrial equipment find themselves in a unique place among manufacturers: • Their products can range from small components to mammoth machines for mines or mills. • They rarely order large production runs and may be called on to create a process that results in an order of one. • Their markets impose challenging constraints. Customers want more choices, more options, more extras, and more features. And they want the order to be fulfilled sooner. The competitive environment is forcing model cycles to shrink, pressuring manufacturers to accelerate processes that are unable to keep pace. Dassault Systèmes DELMIA has assembled an industry-specific set of roles for industrial equipment manufacturers that brings these challenges under control.
Tags : 
    
Dassault Systèmes

More Affordable than HVAC

Published By: MacroAir     Published Date: Apr 26, 2018
HVAC concerns in an industrial facility like a warehouse or manufacturing plant can be complicated. Not only are these spaces usually larger than traditional commercial areas, but they often have equipment or products that need to maintain a specific temperature. MacroAir’s large industrial ceiling fans provide optimal airflow for industrial facilities and are an affordable alternative to HVAC systems. MacroAir’s big industrial fans deliver a cooling effect for occupants, help control the effects of humidity, and can also help conserve heat in colder months by pushing warm air that is trapped at the ceiling toward the walls and down to the floor at occupant level. MacroAir’s big ceiling fans provide an efficient airflow solution and a sustainable alternative to relying on HVAC alone to cool large spaces.
Tags : 
industrial fans, industrial facilities, macroair fans, commercial fans
    
MacroAir

Operational Safety Integrity: Closing the Loop on Safety

Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric

Practical Overview of Implementing IEC 62443 Security Levels

Published By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant, process automation, profitable safety, defence in depth
    
Schneider Electric

Prefabricated Data Centers: Business Advantages for Colocation Providers

Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.