Manufacturing & Retail

Blog

“A Stab in the Back” of IoT Security

Following the topic of the Internet of Things security covered in our latest Analysts’ View newsletter, I’d like to present a perfect example of how IoT device manufacturers are blatantly ignoring the most basic security best practices in their products. As an Austrian…

Analysts' View

KuppingerCole Analysts' View on Things Security

IoT (Internet of Things) and Smart Manufacturing are part of the ongoing digital transformation of businesses. IoT is about connected things, from sensors to consumer goods such as wearables. Smart Manufacturing, also sometimes titled Industry 4.0, is about bridging the gap between the…

Blog

Approaching the Internet of Things Security

As already discussed in one of our earlier newsletters, Internet of Things as a concept is by no means new – various smart devices capable of communicating with each other and their operators have been used in manufacturing, automotive industry, healthcare and even at home. These…

Blog

Security is part of the business. Rethink your organization for IoT and Smart Manufacturing

IoT (Internet of Things) and Smart Manufacturing are part of the ongoing digital transformation of businesses. IoT is about connected things, from sensors to consumer goods such as wearables. Smart Manufacturing, also sometimes titled Industry 4.0, is about bridging the gap between the…

Blog

IoT in industrial computer systems (ICS)

IoT, the Internet of Things, covers a wide range of technologies. My Fitbit e.g. is an IoT device, it connects to my smartphone which formats the data collected on my movements. Also, vehicles that communicate with diagnostic instruments and my home thermostat that I can control via the…

Executive View

Executive View: Waterfall Unidirectional Security Gateway - 71291

Waterfall Unidirectional Security Gateway technology combines specialized security hardware with a broad range of supported industrial protocols and applications to provide a level of network security unattainable by traditional firewalls.

Leadership Brief

Leadership Brief: Breach and Incident Response & Employee Training - 71415

From 2013 to 2014 data breaches nearly doubled. Well known consumer brands, financial institutions, retail chains and government agencies have all been affected. Organisations need to rethink or strengthen their data privacy strategies to cope with this rising threat. Lack of action and…

Advisory Note

Advisory Note: Industrial Control Systems: Getting a Grip on OT Cyber Security - 71110

The time has come for a more inclusive approach to managing industrial control systems. The divide between Information Technology and Operational Technology is fading, to the benefit of the business.

Blog

Dealing with risks in IoT and Smart Manufacturing: Time to rethink your (not only IT) security organization

Let me start with two recent experiences I have had. Just recently, I was sitting in front of a number of CISOs and had the opportunity to ask them how many of them also had responsibility for IoT and smart manufacturing in their organization. The simple answer: none of the CISOs had. At…

Blog

Connected Vehicle: Security First

The recently discovered remote hack vulnerability of Fiat Chrysler Jeep cars, based on their Uconnect functionality, puts a spotlight on the miserable state of connected vehicle security these days. Another recently published article in a German newspaper not only identified a gap in…

Advisory Note

Best Practice: European Identity Award 2015: dm-drogerie markt - 71400

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

Analysts' View

KuppingerCole Analysts' View on Operational Technology / Industry 4.0

Industry 4.0 is the German government’s strategy to promote the computerization of the manufacturing industry. This strategy foresees that industrial production in the future will be based on highly flexible mass production processes that allow rich customization of products. This…

Blog

Security and Operational Technology / Smart Manufacturing

Industry 4.0 is the German government’s strategy to promote the computerization of the manufacturing industry. This strategy foresees that industrial production in the future will be based on highly flexible mass production processes that allow rich customization of products. This…

Blog

OT, ICS, SCADA – What’s the difference?

Operational Technology (OT) refers to computing systems that are used to manage industrial operations as opposed to administrative operations. Operational systems include production line management, mining operations control, oil & gas monitoring etc. Industrial control systems (ICS)…

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Webcast

Louis-Marie Fouchard - Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM

Identity and Access Management is one of the core building blocks to address IT/OT challenges. The specific situation of OT solutions and critical infrastructures, however, entails a set of functional and non-functional requirements which cannot be fulfilled by off-the-shelf IAM products…

Webcast

Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems

In the last years we see that privileged accounts in Operational Technology (OT) environments (e.g. critical infrastructure) have an even higher importance and criticality than in the traditional IT. OT networks and the Internet of Things (IoT) implementations are taking shape and are being…

Webcast

Jackson Shaw - The Convergence of IT, Operational Technology and the Internet of Things

Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security…

Blog

Risk and Governance in Analytics

There is now an enormous quantity of data which is being generated in a wide variety of forms. However this data, in itself, has little meaning or value; it needs interpretation to make it useful. Analytics are the tools, techniques and technologies that can be used to analyze this data into…

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Webcast

Industrial Control System Security: Getting a Grip on OT Cyber Security

Are your operational technology (OT) networks hosting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, well secured? For many organizations, the answer is still “no”. Information security generally focuses on Information Technology (IT) networks…

Blog

Organization, Security and Compliance for the IoT

The Internet of Things (IoT) provides opportunities for organizations to get closer to their customers and to provide products and services that are more closely aligned to their needs. It provides the potential to enhance the quality of life for individuals, through better access to…

Blog

Operational Technology: Safety vs. Security – or Safety and Security?

In recent years, the area of “Operational Technology” – the technology used in manufacturing, in Industrial Control Systems (ICS), SCADA devices, etc. – has gained the attention of Information Security people. This is a logical consequence of the digital transformation of businesses as well…

Webinar

Mar 05, 2015: Industrial Control System Security: Getting a Grip on OT Cyber Security

Are your operational technology (OT) networks hosting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, well secured? For many organizations, the answer is still “no”. Information security generally focuses on Information Technology (IT) networks…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Blockchain: It’s not About Technology, It Is About Use Cases

Today, the German Federal Government announced its Blockchain Strategy. What might sound as a great thing, falls short, for a number of reasons. One is that it is late: after the first hype and somewhere in the phase of disillusion. This should have happened much earlier, specifically with the intent of getting or keeping a leading position. And, notably, more important would be to foster innovation by supporting start-ups with simplified regulations and administration for that type of [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00