04.25.17
At Hannover Messe Industrie, Giesecke+Devrient (G+D) Mobile Security is presenting its complete solution Secure Industrial Visibility (SIV) for the active protection of and remote access to industrial machines.
The solution enables a secure connection between two linked end points in order to defend against industrial espionage and cyber attacks. SIV can be used on equipment from any provider or machine manufacturer and secures existing machines (as a retrofit option), as well as new machinery, in Industry 4.0 environments.
With industrial digitization and the increasing connectivity of machines, the risk to production environments from the Internet is growing rapidly. However, traditional approaches do not offer sufficient protection against cyber attacks: Industrial machines cannot be protected by antivirus software as updates may impact the machine software.
Therefore, manufacturers need to achieve comprehensive protection for the interaction between machines, production control systems. SIV – a complete solution from G+D – provides a secure “tunnel connection” between the two linked end points with fine granular policy management that is controlled entirely by the customer.
The solution enables a secure connection between two linked end points in order to defend against industrial espionage and cyber attacks. SIV can be used on equipment from any provider or machine manufacturer and secures existing machines (as a retrofit option), as well as new machinery, in Industry 4.0 environments.
With industrial digitization and the increasing connectivity of machines, the risk to production environments from the Internet is growing rapidly. However, traditional approaches do not offer sufficient protection against cyber attacks: Industrial machines cannot be protected by antivirus software as updates may impact the machine software.
Therefore, manufacturers need to achieve comprehensive protection for the interaction between machines, production control systems. SIV – a complete solution from G+D – provides a secure “tunnel connection” between the two linked end points with fine granular policy management that is controlled entirely by the customer.