
You need a comprehensive IT security concept for your industrial plants.
Your production processes are networked to the greatest possible extent. You use intelligent machines and benefit from a comprehensively digital automation network: To what time has the former future version Industry 4.0 already found its way into your company?
The fact is: The "fourth industrial revolution" is continuing to advance in Germany.

Five frequently asked questions about Industry 4.0
The abbreviation IoT stands for "Internet of Things" and refers to the increasing networking between "intelligent" devices, both among themselves and externally with the Internet. For example, digital networking of everyday objects can be achieved, such as intelligent building automation systems or devices that contact the user online at certain times or when defined events occur.
Processors are implemented and sensors embedded in the respective objects, items, or machines, among other things, so that communication with each other is possible via an IP network to achieve this.
Industry 4.0 stands for the digitization of industry. The project was initially launched by the German federal government's research union in 2013. This future-oriented project aims to connect machines and systems in such a way that entire industrial processes can be automated. Within production chains, the use of the human factor is reduced. The digitization of processes means that they become more efficient and less expensive. With the IoT and Industry 4.0, industrial processes' self-organization becomes possible through the direct communication of machines, systems, goods, and people. In the meantime, it is no longer just individual production steps that are being automated but entire value chains.*
The term "smart factory" defines the primary goal of the 4th industrial revolution: the networking of a company's entire value creation process. All production and operating chains are networked so that their processes can be digitally controlled and thus centrally coordinated. People, machines, and resources exchange information using wireless standards. Cooperation between remote locations is also possible using appropriate interfaces. The basis for this is cyber-physical systems (CPS), which take over the mediation between real and virtual components.**
Since all phases of the product life cycle can be included here, Industrie 4.0 significantly changes the control of value creation: intelligent value chains are emerging.
A product brings its manufacturing information in machine-readable forms, such as on an RFID chip. At this point, the product's path through the manufacturing plant and the individual manufacturing steps is controlled based on the given data.
Currently, these processes are also experimenting with other transmission technologies such as WLAN, color coding, QR codes, and Bluetooth.
The networking of the entire value creation process of a company is the central aspect of a smart factory. This requires the availability of large amounts of data (big data). For information access or exchange between man and machine, data is generated and transmitted, and stored by cables and wireless technology.
However, besides simplifying workflows, saving costs, and increasing efficiency, this model also harbors many dangers, especially from a security perspective: The potential gateways for data theft, industrial espionage, and cybercrime rise significantly the downside of the smart factory. This makes it all the more important to maintain a comprehensive and continuous overview of one's own IT security structure in the increasingly heterogeneous IT landscapes. This is the only way to ensure that, for example, configurations are not overlooked or misinterpreted, updates are not missed, outdated and vulnerable software is not detected, or standard passwords are not changed.
To be prepared for innovations and the future digitalization of your company's production processes, it is essential to secure your industrial systems and networks comprehensively and continuously. Network segmentation and checking your IT infrastructure with a penetration test are part of this but must be embedded in an overall concept for the area of industrial security.
Together with our partner bluecept, the expert for Industrial Security in Germany, we support you in this challenge. The basis for this is a three-stage "ICS Security Flow" (ICS = Industrial Control Systems). This forms a holistic and perfectly coordinated system that provides you with the protective measures that meet your requirements and circumstances.

The successful model of Digitalization 4.0 can only be profitable for your company in the long term if your networked processes are protected against attacks from cyberspace.
With the use of technologies from standard IT, the vulnerabilities and threats are known from them also reach your process controls. The resulting gateway for attackers is immense!
- What about your process plants' security and availability, two of the most critical operating factors?
- What organizational solutions are recommended to ensure productively and at the same time secure collaboration between IT and OT (Operational Technology)?
- How do you maintain your employees' physical protection, machines, and environment (Safety)?
- How can you minimize the probability of occurrence and the damage consequences of widespread attack types such as WannaCry or NotPetya - and prevent potentially fatal consequences from attacks such as TRISIS?
Communication between IT and technology is crucial to secure digitization in the production and automation environment. If this basis is in place, all business areas of a company benefit.
The most important reasons why you should care about industrial security now
- Prevent equipment failures and thus ensure the availability of your production.
- Avoid physical damage and maintain safety within your automation process.
- Prevent recalls, e.g., by ensuring the integrity of configurations, such as the correct settings for the mixing ratio of anti-rust paints.
- Secure or strengthen customer confidence by demonstrating high quality and safe processes (IEC 62443 certification***).
- Avoid negative publicity and associated reputational damage that a production failure would cause.
- As an operator of critical infrastructures, "KRITIS" remains legally compliant concerning the IT Security Act. There are severe penalties for demonstrable non-compliance.****
- Reduce cyber insurance premiums by demonstrating a high level of protection.


Together with our partner bluecept, our IT security consultants support you in developing and implementing a comprehensive concept for your industrial security area.
The basis for this is the introductory workshop "Introduction to Industrial Security." Together with your employees from the IT and technical departments, the experts first work with you on-site to gain a basic understanding of the complex topic of "Industrial Security". The status quo and specific challenges are compared to secure your automation network optimally, and specific recommendations for action are developed.
Further steps from the IS Flow catalog of measures are implemented as part of continuous Industrial Security Coaching. Your requirements in the area of industrial security form the basis of our cooperation.
Have we aroused your interest?
Our security consultants will be happy to inform you!
Call us at: +49 (0) 40 / 38 90 71 – 0 or send us an e-mail: info@secion.de

* BigData Insider, online edition of 9/1/2016.
** Digitaler Mittelstand, Smart Factory: How the factory of the future works, v. 7.9.2016.
*** IEC 62443 defines a procedure consisting of processes and technologies for both plant operators and product suppliers for the field of industrial automation.
**** https://www.kritis.bund.de/SubSites/Kritis/DE/Rechtsrahmen/IT-SiG_node.html