One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 6209280
Date de publication 2022-08-09 10:00:00 (vue: 2022-08-09 10:06:19)
Titre Are SASE and Zero Trust the key for manufacturers grappling with IoT cyber risks?
Texte As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses, and across supply chain infrastructure is exploding. Manufacturers seek to utilize IoT in a range of places, be it video camera inspection devices on the assembly line, temperature sensors on refrigeration units, or maintenance telemetry sensors on factory equipment. But as they seek to reap tremendous business gains from smart devices in industrial IoT, they also must balance that upside with the potential risks that IoT is increasingly introducing to manufacturing environments. New cyber challenges are arising in the face of this explosion of IoT in manufacturing. They require organizations in this sector to design modern security architecture that can meet them head on. Smart manufacturing and the rise in IoT Consensus across recent industry studies shows that manufacturers are making big bets on smart manufacturing and IoT as the lynchpins to their success in the coming years. According to Deloitte’s 2022 Manufacturing Industry Outlook, some 45% of manufacturing executives expect increases in operational efficiency from investments in IoT that connects machines and automates processes. Meantime, the State of Smart Manufacturing report published in 2022 by Plex found that 83% of manufacturers say that smart manufacturing is a key to their organization’s future success. Smart devices and IIoT are among the most used projects to bring smart manufacturing to fruition. Some 49% of organizations have already deployed smart devices and 45% have put IIoT into production, with another 35% and 36%, respectively, planning to use these technologies. This is rapidly pushing a lot of manufacturing compute out to the edge. AT&T’s own recent analysis for the AT&T Cybersecurity Insights Report: Securing the Edge-A Focus on Manufacturing study found that the manufacturing vertical is one of the furthest along in implementing edge use cases. The report reveals that 78% of manufacturers globally are planning, have partially, or have fully implemented an edge use case - that’s ahead of energy, finance, and healthcare industry organizations.     This kind of progress noted by the report is in sync with other industry studies watching the progress of digital transformation in manufacturing. For example, a study by Palo Alto Networks says the demand for secure remote access in manufacturing is rapidly outstripping other industries. Amid many cited edge use cases such as smart warehousing, remote operations, and augmented maintenance, video-based inspection was the number one edge priority cited by manufacturing respondents to the AT&T Cybersecurity Insights Report . This is a prime example of how IoT is being leveraged to improve efficiency, quality and speed on factory floor, while helping manufacturers also overcome workforce challenges. Unpatchable IoT devices raises manufacturing risk profile Video-based inspection also provides an excellent example of how IoT devices can at the same time potentially increase cyber risk in manufacturing environments. In use cases like this one, IoT devices such as cameras are increasingly connected to OT networks and devices on the manufacturing shop floor. Simultaneously, they’re also opening up access outside th
Envoyé Oui
Condensat “i’ve “it “that ‘hmm  at  in 2022 2022 by access according across actually added advance again against ahead all allows along already also alto alto’s amid among analysis another anything apply architect architected architecture architectures are arising assembly assets at&t at&t’s attack attacks augmented authenticate automates balance based because becomes been being bets between beyond big blogs board both bring business but camera cameras can case cases cause chain challenge challenges check chief cited click cloud coexist come coming common compensate compensating complicated components compromise compromised compute concern conducting connected connectivity connects consensus consistently content contributors control controls course create critical customers cyber cybersecurity dash data deal del deliver deloitte’s demand deployed design device devices devices—a difficult digital discuss don’t downtime edge effective efficiency employees enable enables endpoint energy enforce entire environment environments equipment essentially evangelism example excellent executives existent expanded expect experiences explains exploding explosion face facilities fact factories factory finance flexibility floor flow focus found frequent frequently from fruition fully further furthest future gains globally got grappling growing hacker hardened have head headlong healthcare help helping helps here how human hybrid identify iiot implemented implementing improve includes increase increased increases increasing increasingly industrial industries industry infinitesimally information infrastructure infrequently initiatives innovative inside insights inspect inspection inspections installed interfaces—in internal introduced introducing investments iot issues just key kind know lanowitz larger laterally leading legacy let leveraged like likely line literally locally lot low lynchpins machine machinery machines maintain maintenance makes making manufacturers manufacturing manufacturing     many massive may means meantime meet meeting met methodologies millions mitigate model modern modernized more most mostly move moving much must named the nearly need network network against networks never new non not noted number of video off once one only open opening opens operating operational operations organization’s organizations other out outlook outside outstripping overcome own package palo part partially patched patches patching pilot places planned planning play plex policies positive possible potential potentially pretty primarily prime priority problem processes production profile programs progress projects protect protected provide provides published pushing put quality raises range rapid rapidly realize reap recent recently refrigeration remote remotely report report: require organizations respectively respondents results reveals rise risk risks rodillas running said same sase say says scenarios sector secure securely securing security seek sensitive sensors service setting shop shopping show shows simplistic simply simultaneously smart software solutions some sometimes speed spent spread spreads state strategies strategy studies study success such supply support supporting surface survey sync system systems technologies technology telemetry temperature terms that’s the  augmented them then theresa these they’re threat threats through time times together tolerances transformation tremendous trip trust two unidirectional unified units unlike unpatchable unpatched until update updating upside uptime use used user users utilize vectors vertical very video virtual vulnerabilities vulnerable want warehouses warehousing watching way ways we’ll what where where sase which who why wide windows without work workforce workforces world—device worry would years yet your zero ztna
Tags Threat Studies Patching Guideline
Stories Deloitte
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: