Reaping the benefits of smart manufacturing
Manufacturers can have many hundreds or even thousands of endpoints in their network, from laptops, PCs, and mobile devices to networked production-line machines spread throughout the facility. These connected systems deliver operational efficiencies and even competitive advantage to manufacturers. Smart manufacturing has helped manufacturers achieve productivity gains of 17 to 20 per cent and quality gains of 15 to 20 per cent. However, smart manufacturing also introduces cyber risks, which must be addressed in the most time-efficient, reliable way. Steve Hunter, senior director, Asia Pacific and Japan, ForeScout, said, “In the past, production-line machines were air-gapped; they didn’t have a network connection, so they were safe from cyberthreats. Now, with every machine and device connected to the corporate network and the internet to facilitate smart manufacturing, that safety buffer is removed. Therefore, it’s essential for manufacturers to know what devices are in their network, how vulnerable they are, and their compliance status. All endpoints, including Internet of Things (IoT) sensors, need to be secured.” In many industries, endpoint management is conducted using agents, with IT departments choosing a combination of agents to address their specific requirements. However, the use of agents can create performance issues in manufacturing operations, meaning an agent-based approach is not well-suited to manufacturers. When networked operational or production-line devices are scanned, it can impair performance, reboot the device, or even crash it entirely. This causes expensive downtime. These devices are often vulnerable because they’re older, rarely patched, and less protected against threats. Even new IoT devices can become exploited, because they’re generally not designed with security top of mind. These new IoT devices are often deployed without configuring the few security settings available to them, such as leaving default credentials in place. This lets malicious actors use the unsecured IoT device to access the entire network. […]