Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • 流体动力
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • 领导
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings

New eBook PDF from Rockwell outlines best practices for Industrial Security

ByLisa Eitel|January 30, 2017

Share

Industrial organizations are operating in ways they scarcely could have imagined a few decades ago. They are converging historically separate information technology (IT) and operations technology (OT) systems, and using mobile, analytics and cloud to increase connectivity and information sharing. This is significantly improving operations but also creating more potential entrance points for security threats.

To address this, Rockwell Automation has developed a three-step approach for building an industrial security program that extends from the enterprise to the plant level, and helps mitigate risk across people, processes and technology. The three steps include:

Security assessment:Conduct a facility-wide assessment to understand risk areas and potential threats

Defense-in-depth security:Deploy a multilayered security approach that establishes multiple tiers of defense

Trusted vendors:Verify that your automation vendors follow core security principles when designing their products

“We think of industrial security as a layered model and seek to create a unified infrastructure for customers,” said Lee Lane, chief product security officer, Rockwell Automation. “Our approach takes into account the connections between network security, as well as the physical security and safety in industrial areas.”

For industrial organizations, security threats will continue to evolve. To keep pace, a holistic security program should evolve with and stay ahead of the changing threat landscape. Following the three-step approach will help organizations establish a program that can help protect intellectual property, facilities, assets, employees and competitive advantages into the future.

[bctt tweet=”“We think of industrial security as a layered model,” said Lane of @ROKAutomation” username=”DW_LisaEitel”]

An eBook outlining the three-step approach is available on the Rockwell Automation online newsroom. Click on the image below for the PDF.

Click to download the PDF.


Filed Under:Factory automation,Design World articles
Tagged With:rockwellautomation

About The Author

Lisa Eitel

Lisa Eitel has worked in the motion industry since 2001. Her areas of focus include motors, drives, motion control, power transmission, linear motion, and sensing and feedback technologies. She has a B.S. in Mechanical Engineering and is an inductee of Tau Beta Pi engineering honor society; a member of the Society of Women Engineers; and a judge for the FIRST Robotics Buckeye Regionals. Besides her motioncontroltips.com contributions, she also leads the production of the quarterly motion issues of Design World.

Tell Us What You Think!

Related ArticlesRead More >

Five ways to drive ROI from personnel and cobot investments
Code handheld barcode scanners
Code reader for miniature codes
Solid-state relay characteristics and applications

DESIGN GUIDE LIBRARY

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issue设计的世界,在一个易于使用的问题high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • 10 Reasons to Specify Valve Manifolds
  • Case study: How a 3D-printed tool saved thousands of hours and dollars
  • WAGO’s smartDESIGNER Online Provides Seamless Progression for Projects
  • Stop over-designing: How to save time and money with a light-duty ring
  • Five Reasons: The 2065 Connector is a Reliable Alternative to Manual Soldering
  • Disaster recovery in industrial automation starts with source control

Design World Podcasts

March 14, 2022
How additive “takes the handcuffs off design” in aerospace applications
See More >
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP AWARDS

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy|Advertising|About Us

Search Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • 流体动力
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • 领导
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings
We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website. OkNoRead more