Topics In Demand
Notification
New

No notification found.

Blog
Safety and Security Imperatives of Digital Transformation

164

0

Digital transformation was the central theme at the ARC Industry Forum in Orlando.  And when we talk about the connectivity that digitalization facilitates, the safety and security aspects emerge as  imperatives.  ARC’s Dick Slansky, Senior Analyst, discussed security at the processing level with David Sequino, President INTEGRITY Security Services (ISS), Green Hills Software.  You can watch the video here and/or on YouTube.

Leveraging the Digital Transformation Trend

Talking about the company, David said that ISS is a wholly owned subsidiary of Green Hills Software, a company that provides a provisioning platform and a security platform for Edge to cloud.  “So, we are part of the foundational layer of digital transformation.”

Edge Devices and Solutions

Dick asked about the types of Edge devices and solutions that the company offers.  Or solutions that enable other products to operate on the Edge.

David explained that the company is laser focused on safety critical applications, such as critical infrastructure.  This covers the gamut of control systems for safety critical applications: for oil fields, gas fields, water treatment plants; medical and consumer devices; and all the electronic controller units in the automotive space.

Key Initiatives Going Forward

The company provides a complete secure IoT  provisioning  and management service from the enterprise network to the Cloud to the IoT devices with their flagship product, Device Lifecycle Management (DLM).  This has got three modules:

  • DLM Trust, which is the security module to provision the device with a “birth certificate”
  • Device Management, for over the air (OTA) updates
  • Supply Chain Management

Further, David explained that each of these modules has DLM dashboards.  This allows them to take data off the Edge in an authenticated manner, “because everything we do starts with security.”

What about Blockchain?

Blockchain is a hot topic right now, said David.  The prevailing use case for Blockchain is clearly currency, and the company sees the opportunity for it.  “But, our deal in platform is a public key platform and a symmetric key platform, so every single code signing application we do for moving a digital asset (cloud-Edge or Edge- cloud) is designed to be hashed and timestamped, very similar to the technology around Blockchain, but we also use public key to ensure the people sending it are also authenticated.  So, we sort of see the DLM platform as Blockchain on steroids in an operational format that people can use,” said David.

Cybersecurity Requirements for Safety and Security

Cybersecurity requirements continue to increase at all levels, in industrial automation and at the enterprise markets. “How is your company responding with new products and solutions and partnerships in this area?” asked Dick.

At this point, the company is carefully picking its customers, said David.  The focus is on safety critical and security critical applications.  The company is moving into the aerospace and defense market where, historically, they’ve used traditional ways of protection (guns and big fences) and people that have worked at the companies for years.  “Now they are realizing that’s not enough.”

Another major challenge is bringing people into the organization and teaching them what needs to be done.  And that is also the customer’s challenge: there aren’t enough people that understand cybersecurity from an embedded perspective.

Avoiding Unplanned Downtime

Unplanned downtime is a challenge for every customer.  David said, “Everything that we do in our DLM platform is done in a redundant manner and has high availability.  We do very high-volume provisioning (over a billion devices a year) at the semiconductor level.  And, having a semiconductor product line go down is a real challenge for our customers.  We do disaster recovery, we have test, production, and pre-production networks.”  Further, he said that depending upon the application and the volume, they ensure that the DLM platform can scale.

Advanced Analytics

Most manufacturers seek advanced analytics solutions, such as predictive and prescriptive analytics, to sort through the endless amounts of data and convey that into actionable information.  “What advanced analytics solutions does your company offer, and is it being incorporated into other products and solutions that your company offers?” asked Dick.

David responded that the company’s DLM dashboard is a feature on top of the DLM platform.  This provides security, device management, supply chain management, and then dashboards for stratifying the data.  “Because, in some cases, you might want one group of people to see certain data, which is not visible to another group, but without DLM Trust to digitally sign and tie it to users, you wouldn’t be able to create those silos of trust.  So that’s what we are doing.”

“Reprinted with permission, original blog was posted here”. You may also visit here for more such insights on the digital transformation of industry.

About ARC Advisory Group (www.arcweb.com): Founded in 1986, ARC Advisory Group is a Boston based leading technology research and advisory firm for industry and infrastructure.

For further information or to provide feedback on this article, please contact RPaira@arcweb.com

About the Author:

Dick Slansky

Dick’s focus areas include product lifecycle management (PLM), engineering design tools for plant design and infrastructure, asset lifecycle management, Industrial IoT, predictive/prescriptive analytics for production systems, digital twin, virtual simulation for product development and production systems.


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


© Copyright nasscom. All Rights Reserved.