-
- News
- Books
Featured Books
- smt007 Magazine
Latest Issues
Current IssueThe Butterfly Effect
The basis of chaos theory is a key concept known as the “butterfly effect.” It’s the idea that a small event in one place creates a cascading set of events elsewhere. So, how is the EMS landscape changing? We’re tracking the concerns and dynamics of this landscape, and there’s a lot to learn.
Coming to Terms With AI
In this issue, we examine the profound effect artificial intelligence and machine learning are having on manufacturing and business processes. We follow technology, innovation, and money as automation becomes the new key indicator of growth in our industry.
Box Build
One trend is to add box build and final assembly to your product offering. In this issue, we explore the opportunities and risks of adding system assembly to your service portfolio.
- Articles
- Columns
Search Console
- Links
- Events
||| MENU - smt007 Magazine
The Digital Future Must be Secure: MOM from iTAC Provides Security at All Levels
June 21, 2024 | iTAC Software AGEstimated reading time: 2 minutes
Increasing digitalization and networking are creating more gateways for cyber threats. Protecting sensitive production data and ensuring business continuity are therefore important for companies. And the security starts with the software in use. A holistic approach to security – from architecture and software design to implementation, testing and deployment – is crucial here. The holistic production management system (MOM) from iTAC Software AG is designed to do exactly that.
"In an increasingly networked world, in which the control and optimization of production processes must be raised to a new level, new types of software solutions are needed. This is where modern MOM systems come in, representing an evolutionary development of MES," explains Volker Burch, Vice President R&D at iTAC Software AG.
MOM systems with SCADA and APS functionalities, such as those offered by iTAC, the parent company Dürr and the subsidiary DUALIS in combination, offer various advantages over traditional MES. The switch from monolithic systems to microservice-oriented architectures enables greater flexibility, scalability and agility in the production environment.
Thanks to the modular structure of the MOM, companies can select specific functions from the standard portfolio in a process-oriented manner, configure them as required and – if necessary – adapt them in order to optimally integrate the processes and achieve the desired benefits.
From MES to MOM
"The switch from MES to MOM brings significant benefits for production management and the supply chain. In times of increasing threats to companies from criminal hackers and institutions, future-proof MOM systems must now also be developed, integrated and operated with a strong focus on IT security. By introducing security measures in all aspects, companies can achieve a secure, robust and trustworthy manufacturing IT landscape that meets the requirements of a modern factory," says Volker Burch.
iTAC ensures that security aspects are integrated into the process right from the start. From development to implementation and operation of the iTAC.MOM.Suite, clear guidelines and state of the art standards are followed. A holistic approach – from architecture and software design to implementation, testing and deployment – takes the relevant security aspects into account at every stage and is supported by established, audited processes and tools. While there used to be common security vulnerabilities in the development of software, these are now largely eliminated thanks to the support of tools that provide early warning of potential threat scenarios.
Laws and guidelines provide a new framework
There are also various efforts and measures on the part of legislators to strengthen the resilience of organizations to cyber attacks and to minimize the impact of security incidents. The Cyber Resilience Act is currently gaining in importance in this context.
Volker Burch explains: "The Cyber Resilience Act is a clear call to action that requires companies to strengthen their security measures and proactively address cyber threats. By implementing cybersecurity best practices, organizations can not only protect their data and operations, but also protect their investment and reputation by building trust with customers. Otherwise, security incidents cause potential financial losses and reputational damage. In addition, the Cyber Resilience Act offers companies the opportunity to differentiate themselves from competitors by demonstrating that they are actively addressing cybersecurity challenges and continuously improving their systems and processes."
Compliance with guidelines and laws is also of global relevance, as Volker Burch points out: "By investing in secure systems such as our MOM, companies can not only protect their own interests, but also help to strengthen the overall security of the digital industry."
Suggested Items
New IPC Europe Report, Advocacy Campaign
06/24/2024 | Alison James, IPCIn the European Union, as in the United States, today’s geopolitical realities are shaping a new approach to the region’s industrial strategy. The wars in Ukraine and the Middle East, as well as tensions in East Asia and actions being taken in other regions to support key industries, are heightening Europe’s focus on measures to close productivity and innovation gaps, especially where they raise security concerns.
BAE Systems, GlobalFoundries Collaborate to Strengthen Supply of Essential Semiconductors for National Security Programs
06/24/2024 | BAE SystemsBAE Systems and GlobalFoundries announced a new collaboration to strengthen the supply of critical semiconductors for national security programs. Dr. Thomas Caulfield, president and CEO of GF. “We are proud to deepen our strategic relationship with BAE Systems, and further strengthen supply chain resiliency. Together, we will accelerate the research and development of a new generation of essential technologies and securely manufacture essential chips for a diverse range of critical defense applications.”
DigiKey Receives ISO 27001 Certification, Adding to Robust Information Security Program THIEF
06/21/2024 | Digi-KeyDigiKey, a leading global commerce distributor offering the largest selection of technical components and automation products in stock for immediate shipment, announced it has added ISO 27001 certification to its robust data security program.
Northrop Grumman Secures Long-Term Supply Agreement with Norway’s Chemring Nobel
06/11/2024 | Northrop GrummanNorthrop Grumman Corporation and Chemring Nobel AS (CHN), a Norwegian-based specialty chemicals company, recently signed a long-term sourcing agreement for high-energy, explosive powder known as HMX to support warhead production at Northrop Grumman’s Missile Products manufacturing location at Rocket Center, West Virgina.
Elbit Systems Awarded a Contract of Approximately $260 Million by an International Customer
05/24/2024 | PRNewswireElbit Systems Ltd. announced that it was awarded a contract to supply systems to an international customer, in an amount of approximately $260 million. The contract will be performed over a period of 2 years.