Blog Posts Business Management

Safety and Security Imperatives of Digital Transformation

Blog: NASSCOM Official Blog

Digital transformation was the central theme at the ARC Industry Forum in Orlando.  And when we talk about the connectivity that digitalization facilitates, the safety and security aspects emerge as  imperatives.  ARC’s Dick Slansky, Senior Analyst, discussed security at the processing level with David Sequino, President INTEGRITY Security Services (ISS), Green Hills Software.  You can watch the video here and/or on YouTube.

Leveraging the Digital Transformation Trend

Talking about the company, David said that ISS is a wholly owned subsidiary of Green Hills Software, a company that provides a provisioning platform and a security platform for Edge to cloud.  “So, we are part of the foundational layer of digital transformation.”

Edge Devices and Solutions

Dick asked about the types of Edge devices and solutions that the company offers.  Or solutions that enable other products to operate on the Edge.

David explained that the company is laser focused on safety critical applications, such as critical infrastructure.  This covers the gamut of control systems for safety critical applications: for oil fields, gas fields, water treatment plants; medical and consumer devices; and all the electronic controller units in the automotive space.

Key Initiatives Going Forward

The company provides a complete secure IoT  provisioning  and management service from the enterprise network to the Cloud to the IoT devices with their flagship product, Device Lifecycle Management (DLM).  This has got three modules:

Further, David explained that each of these modules has DLM dashboards.  This allows them to take data off the Edge in an authenticated manner, “because everything we do starts with security.”

What about Blockchain?

Blockchain is a hot topic right now, said David.  The prevailing use case for Blockchain is clearly currency, and the company sees the opportunity for it.  “But, our deal in platform is a public key platform and a symmetric key platform, so every single code signing application we do for moving a digital asset (cloud-Edge or Edge- cloud) is designed to be hashed and timestamped, very similar to the technology around Blockchain, but we also use public key to ensure the people sending it are also authenticated.  So, we sort of see the DLM platform as Blockchain on steroids in an operational format that people can use,” said David.

Cybersecurity Requirements for Safety and Security

Cybersecurity requirements continue to increase at all levels, in industrial automation and at the enterprise markets. “How is your company responding with new products and solutions and partnerships in this area?” asked Dick.

At this point, the company is carefully picking its customers, said David.  The focus is on safety critical and security critical applications.  The company is moving into the aerospace and defense market where, historically, they’ve used traditional ways of protection (guns and big fences) and people that have worked at the companies for years.  “Now they are realizing that’s not enough.”

Another major challenge is bringing people into the organization and teaching them what needs to be done.  And that is also the customer’s challenge: there aren’t enough people that understand cybersecurity from an embedded perspective.

Avoiding Unplanned Downtime

Unplanned downtime is a challenge for every customer.  David said, “Everything that we do in our DLM platform is done in a redundant manner and has high availability.  We do very high-volume provisioning (over a billion devices a year) at the semiconductor level.  And, having a semiconductor product line go down is a real challenge for our customers.  We do disaster recovery, we have test, production, and pre-production networks.”  Further, he said that depending upon the application and the volume, they ensure that the DLM platform can scale.

Advanced Analytics

Most manufacturers seek advanced analytics solutions, such as predictive and prescriptive analytics, to sort through the endless amounts of data and convey that into actionable information.  “What advanced analytics solutions does your company offer, and is it being incorporated into other products and solutions that your company offers?” asked Dick.

David responded that the company’s DLM dashboard is a feature on top of the DLM platform.  This provides security, device management, supply chain management, and then dashboards for stratifying the data.  “Because, in some cases, you might want one group of people to see certain data, which is not visible to another group, but without DLM Trust to digitally sign and tie it to users, you wouldn’t be able to create those silos of trust.  So that’s what we are doing.”

“Reprinted with permission, original blog was posted here”. You may also visit here for more such insights on the digital transformation of industry.

About ARC Advisory Group (www.arcweb.com): Founded in 1986, ARC Advisory Group is a Boston based leading technology research and advisory firm for industry and infrastructure.

For further information or to provide feedback on this article, please contact RPaira@arcweb.com

About the Author:

Dick Slansky

Dick’s focus areas include product lifecycle management (PLM), engineering design tools for plant design and infrastructure, asset lifecycle management, Industrial IoT, predictive/prescriptive analytics for production systems, digital twin, virtual simulation for product development and production systems.

The post Safety and Security Imperatives of Digital Transformation appeared first on NASSCOM Community |The Official Community of Indian IT Industry| :))iiğ.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/safety-and-security-imperatives-of-digital-transformation/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×