Securing Devices By Design

Feb. 13, 2015
Mentor Graphics and Icon Labs make security a native component of the embedded operating system

Automation and industrial control system vendors have an opportunity to leverage the Industrial Internet of Things (IIoT) for remote diagnostics and data analytics, which could lead to new revenue opportunities. But with reward comes risk. Opening the lines of communication between a control system and a far-flung field device could also introduce a security threat.

Indeed, IIoT security can’t be an afterthought, which is why electronic design automation provider Mentor Graphics is teaming up with Icon Labs, a supplier of embedded networking and security technology.

This week at the ARC Industry Forum in Orlando, the companies announced the integration of Icon Labs’ Floodgate security products with Mentor Graphics’ Nucleus real-time operating system (RTOS) and Mentor Embedded Linux. Together, the technologies deliver security management and data protection within the operating systems so that devices are secure from the inside out.

Building security directly into devices provides protection that reduces the need for additional security appliances. “Most [companies] in this space focus on securing the perimeter, but that doesn’t protect the endpoint,” says Alan Grau, president of Icon Labs. “It also doesn’t position the device for the future because it provides no visibility.”

The Floodgate framework enables security policy management, event and command audit log reporting, integration with McAfee ePolicy orchestrator (ePO) security management software, an integrated firewall, and firmware and data anti-tamper capabilities-- all of which are natively supported within the Mentor Graphics operating systems.

The built-in security complements the other announcement this week from Mentor Graphics. The new Mentor Embedded multi-platform development tool provides industrial automation developers with integrated and tested capabilities for system partitioning, power management, safety and certification, and more, allowing equipment manufacturers to focus on developing value-add into industrial devices.

Grau says the industrial control system (ICS) vendors recognize the need for security-by-design systems rather than bolt-on offerings, and, as a result, Icon Labs is currently in early stage projects with several ICS vendors.

Today, industrial automation systems include complex connected devices expected to perform important functions, Grau says, and “including security in these devices is a critical design task.” As the number of attacks—and the sophistication of attacks—increase, the need for a comprehensive end-to-end approach to security will be a requirement to ensure devices are protected from future cyber threats, he says.

About the Author

Stephanie Neil | Editor-in-Chief, OEM Magazine

Stephanie Neil has been reporting on business and technology for over 25 years and was named Editor-in-Chief of OEM magazine in 2018. She began her journalism career as a beat reporter for eWeek, a technology newspaper, later joining Managing Automation, a monthly B2B manufacturing magazine, as senior editor. During that time, Neil was also a correspondent for The Boston Globe, covering local news. She joined PMMI Media Group in 2015 as a senior editor for Automation World and continues to write for both AW and OEM, covering manufacturing news, technology trends, and workforce issues.

Sponsored Recommendations

Put the Plant Floor in Your Pocket with Ignition Perspective

Build mobile-responsive HTML applications that run natively on any screen.

Ignition: Industrial-Strength System Security and Stability

Ignition is built on a solid, unified architecture and proven, industrial-grade security technology, which is why industrial organizations all over the world have been trusting...

Iron Foundry Gains Competitive Edge & Increases Efficiency with Innovative Technology

With help from Artek, Ferroloy implemented Ignition to digitally transform their disconnected foundry through efficient data collection and analysis while integrating the new ...

Empowering Data Center Growth: Leveraging Ignition for Scalability and Efficiency

Data center growth has exploded over the past decade. Initially driven by organizations moving their computer assets to the cloud, this trend has only accelerated. With the rise...