MB Connect Header
  • Product Presentation
  • Management I
  • Cloud Security
  • Industry 4.0 / IoT / Edge Computing
  • Network Security / Patch Management
  • Websecurity/VPN

No production machine on the net - We are secure! Myth or reality?

The production area is increasingly becoming the target of cyber attacks. How can secure remote access and networking still be achieved?

10/8/2020 1:00:00 PM – 10/8/2020 1:15:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

MB Connect Header
  • Product Presentation
  • Management I

The production area is increasingly becoming the target of cyber attacks. How can secure remote access and networking still be achieved?

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

Remote access of machines and plants is becoming more and more important for medium-sized companies. Especially in these times, where travel is avoided, but machines still need appropriate service, remote access is used.
However, there are always fears among users with regard to the IT security of remote access. The presentation is intended to show that remote access can be designed to be absolutely secure and at the same time conform to the state of the art. Different application possibilities of industrial remote access will be shown from the simple remote desktop to direct transparent network connections on machine controls. The industrial router mbNET.rokey is used to explain how a key switch on the router can be an effective solution for operators and manufacturers.
The industrial firewall mbNETFIX ensures the secure networking of machines with each other in the production network. It can be operated as a standalone or additional component for remote maintenance. The simple parameterization of this firewall avoids configuration errors and the operation is adapted to the workflow of an automator.
The presentation informs about the application scenarios of secure industrial remote access and networking and the associated risks and opportunities.

read more

Speaker