-
- News
- Books
Featured Books
- smt007 Magazine
Latest Issues
Current IssueThe Rise of Data
Analytics is a given in this industry, but the threshold is changing. If you think you're too small to invest in analytics, you may need to reconsider. So how do you do analytics better? What are the new tools, and how do you get started?
Counterfeit Concerns
The distribution of counterfeit parts has become much more sophisticated in the past decade, and there's no reason to believe that trend is going to be stopping any time soon. What might crop up in the near future?
Solder Printing
In this issue, we turn a discerning eye to solder paste printing. As apertures shrink, and the requirement for multiple thicknesses of paste on the same board becomes more commonplace, consistently and accurately applying paste becomes ever more challenging.
- Articles
- Columns
Search Console
- Links
- Media kit
||| MENU - smt007 Magazine
The Digital Future Must be Secure: MOM from iTAC Provides Security at All Levels
June 21, 2024 | iTAC Software AGEstimated reading time: 2 minutes
Increasing digitalization and networking are creating more gateways for cyber threats. Protecting sensitive production data and ensuring business continuity are therefore important for companies. And the security starts with the software in use. A holistic approach to security – from architecture and software design to implementation, testing and deployment – is crucial here. The holistic production management system (MOM) from iTAC Software AG is designed to do exactly that.
"In an increasingly networked world, in which the control and optimization of production processes must be raised to a new level, new types of software solutions are needed. This is where modern MOM systems come in, representing an evolutionary development of MES," explains Volker Burch, Vice President R&D at iTAC Software AG.
MOM systems with SCADA and APS functionalities, such as those offered by iTAC, the parent company Dürr and the subsidiary DUALIS in combination, offer various advantages over traditional MES. The switch from monolithic systems to microservice-oriented architectures enables greater flexibility, scalability and agility in the production environment.
Thanks to the modular structure of the MOM, companies can select specific functions from the standard portfolio in a process-oriented manner, configure them as required and – if necessary – adapt them in order to optimally integrate the processes and achieve the desired benefits.
From MES to MOM
"The switch from MES to MOM brings significant benefits for production management and the supply chain. In times of increasing threats to companies from criminal hackers and institutions, future-proof MOM systems must now also be developed, integrated and operated with a strong focus on IT security. By introducing security measures in all aspects, companies can achieve a secure, robust and trustworthy manufacturing IT landscape that meets the requirements of a modern factory," says Volker Burch.
iTAC ensures that security aspects are integrated into the process right from the start. From development to implementation and operation of the iTAC.MOM.Suite, clear guidelines and state of the art standards are followed. A holistic approach – from architecture and software design to implementation, testing and deployment – takes the relevant security aspects into account at every stage and is supported by established, audited processes and tools. While there used to be common security vulnerabilities in the development of software, these are now largely eliminated thanks to the support of tools that provide early warning of potential threat scenarios.
Laws and guidelines provide a new framework
There are also various efforts and measures on the part of legislators to strengthen the resilience of organizations to cyber attacks and to minimize the impact of security incidents. The Cyber Resilience Act is currently gaining in importance in this context.
Volker Burch explains: "The Cyber Resilience Act is a clear call to action that requires companies to strengthen their security measures and proactively address cyber threats. By implementing cybersecurity best practices, organizations can not only protect their data and operations, but also protect their investment and reputation by building trust with customers. Otherwise, security incidents cause potential financial losses and reputational damage. In addition, the Cyber Resilience Act offers companies the opportunity to differentiate themselves from competitors by demonstrating that they are actively addressing cybersecurity challenges and continuously improving their systems and processes."
Compliance with guidelines and laws is also of global relevance, as Volker Burch points out: "By investing in secure systems such as our MOM, companies can not only protect their own interests, but also help to strengthen the overall security of the digital industry."
Suggested Items
Romania Becomes the 20th Member of the F-35 Global Alliance
11/21/2024 | Lockheed MartinThe Government of Romania confirmed today its intent to procure 32 Lockheed Martin 5th Generation F-35 Lightning II aircraft by signing a Letter of Offer and Acceptance (LOA) through a U.S. government Foreign Military Sale.
DARPA Taps RTX to Strengthen Cyber Resiliency
11/11/2024 | RTXRTX's BBN Technologies was awarded a contract to support DARPA's Compartmentalization and Privilege Management, or CPM, program. The CPM program aims to enhance cyber resilience by automatically subdividing software systems into smaller, secure compartments, preventing initial breaches from escalating into successful cyberattacks while maintaining system efficiency.
SIA Statement on Election Results
11/08/2024 | SIAThe Semiconductor Industry Association (SIA) released the following statement from SIA President and CEO John Neuffer regarding this week’s election results.
Security for Embedded Systems: Swissbit Presents the Security Upgrade Kit
11/07/2024 | SwissbitCyberattacks are increasingly affecting embedded systems, whose design and long lifecycles entail special security requirements. Regulatory authorities worldwide are responding to this growing threat with regulations such as the upcoming Radio Equipment Initiative (RED) or the Cyber Resilience Act of 2027.
Despite Regional 200x Funding Differences, Post-Quantum Readiness Won’t Hinder eIDAS Unity
11/05/2024 | ABI ResearchPost-Quantum Cryptography (PQC) inevitably has an outsized impact on a technology remit covering many trust service use cases, with cryptographically robust signing acting as the market's core. Without this, there is no trust and, therefore, no Electronic Identification and Trust Services (eIDAS).