Flexible manufacturing involves the
exchange of sensitive data between
various interconnected devices and
systems. This data can include proprietary
designs, production schedules, customer
information, and more. Ensuring
cybersecurity prevents unauthorized
access and theft of this valuable
information."
Ravi Rai
Senior Engineer, SICK Sensor Intelligence
C h a p t e r 5 | C y b e r s e c u r i t y a n d D a t a P r i v a cy C o n s i d e r a t i o n s
Properly safeguarding data requires a keen focus
on authentication, which involves the use of keys or
certificates to establish trust in the communication
between devices on a network. Integrating
authenticators into a system can ensure that no
malicious adversaries are trying to steal sensitive
data from the factory floor.
For example, if an entity wanted to access real-time
data from a piece of automated equipment, it would
have to present the proper credentials before being
granted access. In this way, authentication adds
a layer of security to the factory floor such that
communication can still be freely conducted among
authorized entities.
ADI offers a comprehensive range of security
solutions, including secure authenticators and
coprocessors, for customers to keep their data
secure and private. ADI's security business unit also
works with customers to address concerns and even
co-develop solutions.
21
10 Experts on Flexible Manufacturing