As the network infrastructure evolves to include more connected systems and smart devices, so must a company’s security strategy. The move is on to a built-in vs. a bolt-on model, which requires an ecosystem of technology partners and an eye toward business.
IT Delivers on Automation’s Promise
Sign up to receive timely updates from the editors at Automation World and download this FREE Special Report on the transformative power of data in manufacturing. By integrating information and automation technologies, manufacturers are finally achieving major gains in productivity from their automated systems.
Meeting recently in Frankfurt, Germany, the committee responsible for industrial automation and control system (IACS) security standards reviewed current concepts and worked to advance continuing development.
ICS threats can be malicious attacks from the outside or operator error. To address both, PAS has a new version of Cyber Integrity, adding patch management, security policy workflows and enhanced visibility from the operator dashboard.
See a live demo of a system from B&R Industrial Automation, and learn how it provides secure, remote access to machines in this demo, a remote robot for optimal monitoring, diagnostics and maintenance.