search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
PC-SEP24-PG20.1_Layout 1 16/09/2024 11:58 Page 20


INDUSTRY 4.0/IIOT


Tiago Laranjo, VP, Solutions Consulting Europe at GTT, explains how


manufacturers can balance innovation and security using SD- WAN technologies


T


here’s no doubt that the manufacturing sector has undergone a major digital transformation in recent years. Industry 4.0 and the rise of Industrial IoT (IIoT), in particular, have taken the sector by storm. By improving output and reducing costs, modern technologies are enabling manufacturers to remain competitive and help create the foundation for future innovation.


However, as intelligent devices reshape the


shop floor and the manufacturing ecosystem becomes increasingly dispersed, the threat posed by network outages and cyberthreats increases.


In a world where everything is connected, you are only as strong as your weakest link. In a connected landscape, if one device goes down, a business’s entire production could be adversely impacted. Similarly, if an attacker successfully finds one entry point, they could disrupt the whole network.


A recent Deloitte study found that 86% of manufacturing executives believe that smart factory solutions will be the primary drivers of competitiveness over the next five years. As technology’s role continues to grow, connectivity has never been more important, but with the use of IIoT expanding, manufacturers are discovering that their networks are no longer clearly defined. This creates several challenges.


One of these challenges is the risk of production downtime. As manufacturing relies increasingly on digital technologies and cloud-connected devices, a network failure poses a serious challenge. The lack of data availability can cause production to falter, leading to delays and increasing costs. Meanwhile, modern manufacturing’s extended ecosystem – which comprises of globally distributed production units, raw material vendors, logistical partners, and outsourced service providers – increases the risk of potential cybersecurity vulnerabilities. The vast amounts of data being transmitted from IIoT devices each day is also making protecting intellectual property rights and safeguarding unique production processes


20 SEPTEMBER 2024 | PROCESS & CONTROL


RESHAPING MANUFACTURING WITH SD-WAN TECHNOLOGIES


from hackers and malicious internal attackers a growing challenge.


For an industry already struggling with high energy prices, supply chain instability, and labour shortages, dealing with inconsistent connectivity and increasing network security risks can become overwhelming. This is where SD-WAN can help.


By providing an overlay network architecture for application-aware routing, instantaneous failover and cybersecurity capabilities, SD- WAN supports the new digital-first mode of manufacturing. It is a dynamic and intelligent approach to the industry’s networking challenges. SD-WAN can be easily integrated with other powerful cybersecurity mitigation strategies. For example, it can work alongside segmentation security – which involves dividing a network into multiple segments or sub-networks - to minimise the risk and contain the potential impact of a cybersecurity breach.


Manufacturers need a comprehensive approach to connectivity with security at its heart. This should include robust firewall technology, malware protection, and real-time intrusion/detection services. An extended security perimeter, which covers distributed and remote locations, is also essential. SD-WAN is the ideal solution because it secures sensitive data with encrypted data transfer to protect against unauthorised access. It is a foundational layer to building out an advanced Secure Access Service Edge (SASE) framework, where multiple technologies come together to form a single, networking and cloud-based cybersecurity solution. SD- WAN along with Security Service Edge (SSE) provides a smooth transition to SASE, providing a scalable network with cloud-based security. In addition to boosting security posture, SD- WAN enables seamless data transmission from IIoT sensors, real-time machine-to- machine communication, and high-speed


data analysis. Unlike more traditional WAN services, which require manual configurations and additional hardware, SD-WAN is software- based and centrally managed. This provides scalability and end-to-end management of all IIoT components on the network. In order to leverage the potential of SD-WAN effectively, manufacturers should consider working with an experienced managed services partner who can offer tailored solutions. The advantages partners can offer include global reach complemented by local knowledge, filling resource gaps due to employee shortages, and being able to address each organisation’s requirements. Working with the right partners will open the door to additional security services and concepts such as SASE, designed to deliver layered end-to-end protection for the entire enterprise. Partners can also help businesses to enhance their security postures even further, offering solutions for next-level protection such as Managed Detection and Response (MDR) – a hybrid solution made up of people and technology that monitors security infrastructure and potential threats to detect anomalies – and Distributed Denial of Service (DDoS) protection and mitigation services – a managed service that provides comprehensive protection of infrastructure being overwhelmed by malicious traffic. When it comes to both security threats and network outages, the longer it takes to identify and locate them, the more expensive the incident becomes in terms of time, data, production, and reputation loss. The right mix of SD-WAN with an integrated segmentation firewall and other security solutions like SSE, MDR and DDoS can help manufacturers detect and mitigate abnormalities quickly, addressing points of vulnerability and securing every access point.


GTT www.gtt.net/gb-en/


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48