September 2018
Intermediate to advanced
412 pages
11h 12m
English
Given that the success of IIoT lies in the assimilation and leveraging of IT and operational technology (OT) data, it is important to take steps to make sure that security concerns for one do not impact the other. For example, the IT systems have been connected to the internet and have been secured through various solutions for a while; however, the OT devices are still in the process of being connected to the cloud, which makes them vulnerable to security threats. Moreover, these devices are well-ingrained into workflows, and therefore have contact with several pieces of plant equipment. One way to isolate these is to provide an on-demand secure network segment, separate from the one supporting traditional ...