Cloud Security & iot security

Using cloud services securely in digitised manufacturing

Digitisation in industry means flexible and quick cooperation beyond corporate boundaries. Big data solutions are used to make products and services more efficient and to tailor them to customers’ needs. The method of choice: the cloud. The cloud is a universal platform for industrial IoT applications, which makes it possible to implement various different service models (SaaS, PaaS, IaaS). But what about security in the cloud?

Cloud security - whose responsibility is it?

Responsibility for security is obviously shared by cloud providers and cloud users. Whilst cloud providers are responsible for the infrastructure, i.e. data centre buildings, server landscape and, depending on the service model, operating systems, APIs etc., the users are responsible for the access points and their own applications.

The biggest threats out of the top 12 threats in cloud computing are:

  • Humans with inadequate user and access management,
  • Insecure API to cloud services
  • Inadequate management of known vulnerabilities (so-called exploits = malware that exploits malfunctions in utilities and applications),
  • IT security policies that are inadequate, missing or not implemented

The typical effect of cyber attacks is data loss, e.g. the loss of integrity or confidentiality of the data stored in the cloud.



How can companies effectively combat the loss of sensitive data or data espionage?

Risk assessment
A comprehensive risk assessment should be carried out, along with an analysis of the current situation, before taking a look at the possible technical solutions. Janz Tec will guide you through the process and help you identify risks, assess them and draw up measures for an IT security strategy.

The Security Ecosystem as a gatekeeper for the cloud
On the technological level, the Fully Protected Security Ecosystem offers you a solution that can be adapted to suit a wide range of applications and is also scalable. It plays the role of a gatekeeper for the cloud at the interface to the cloud: directly on your machine or system. This means that we take a more comprehensive approach and intervene earlier than currently available security concepts that focus on the cloud itself.

Multi-stage security concept
As a company, you benefit from a multi-stage security concept that secures your access to the cloud with centrally managed identity management, data encryption and the protection of network connections, amongst other things. Making some of the cloud services available offline and buffering data also makes it possible to bridge connection disruptions.

Give our Security Ecosystem within our IoT solution toolkit a try and see for yourself.
Simply concentrate on your own transformation processes and leave us to manage the threats that accompany digitisation. We are your computing partner, with over 35 years of expertise in highly individualized industrial machine and process control systems with a unique hardware and software product portfolio for initial installation and retrofitting.

White Paper download

IT-retrofitting – Secure IoT for existing machinery and systems

16-page white paper on the networking of existing machinery and systems, using an IEC 62443-compliant security concept – to ensure a successful digitalization strategy.