<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=307244649728517&amp;ev=PageView&amp;noscript=1">
December 13, 2016

Speed and Safety – Industrial Cybersecurity in a Cloud First World

Paul Shelton
Paul Shelton

Paul Shelton is responsible for the strategic direction of the Wonderware Information Management software business. This includes research and development, engaging the distributor channel, and working with the global sales, delivery and marketing teams. The business segment also leads our Microsoft Azure and mobility priorities. Prior to this role Paul managed the Wonderware channel in North America for eight years.

Join The Growing Wonderware Community

Stay informed with the latest on Wonderware's Industrial Information Management portfolio.

With the growth of the Industrial Internet of Things (IIoT), organizations have an amazing opportunity to unlock actionable insights within their industrial data.

In particular, cloud information management solutions empower employees by making key data and KPIs accessible anywhere, on any device and exposing hidden opportunities to optimize operations.

Unfortunately, these new capabilities also provide potential access points for malicious agents. In the IIoT age, industrial cybersecurity is critical – according to the University of Cambridge Centre for Risk Studies, a coordinated cyber-attack on the U.S. power grid could inflict up to $1 trillion in damages. The challenge for organizations implementing a cloud solution is effectively safeguarding industrial data without compromising simplicity and ease-of-use.


Saadi Kermani explains three important factors to consider in industrial cybersecurity


There are several security factors that you should consider when implementing a cloud information management solution.

First of all, data security is critical. Be sure to pick a vendor using the latest encryption protocols to ensure your data is protected. A reliable vendor will store customer data in a secure multi-tenant architecture, limiting the risk of compromised information. Be wary of “black-box” technologies and choose a transparent solution that has been tested extensively on the market.

A flexible cloud solution that allows full customization of user access is also important. Encrypted data is only as secure as access to that data, so it’s critical that solutions allow users to customize levels of user access. Finally, make sure to select a solution that is easy to implement and builds on your existing systems.

Selecting a secure cloud information management solution allows organizations to leverage the IIoT to unlock actionable insights while protecting their data, their customers and the bottom line.


Safe in the Cloud 

Wonderware Online Insight is an easy to use cloud solution capable of collecting, visualizing, and managing data across industrial operations that is safe, secure and reliable.  

Online Overview.png

Download Full Infographic

Built on Microsoft Azure, Wonderware Online InSight uses the most up-to date security standards available. Customer data is encrypted using HTTPS on the industry standard and well-defined Port 443 using Advanced Encryption Standard (AES) 256-bit encryption with secure 2048-bit X.509 certificates. The Wonderware team continuously monitors the current security landscape and performs regular updates to offer the best available protections to customers for their sensitive data. Cloud services are physically deployed across multiple Microsoft Azure data centers — world-class facilities with more certifications than any other cloud provider.

Customer data is stored in a patented multi-tenant architecture that is logically segregated and segmented, protecting customer data from unauthorized access while protecting the privacy, control and autonomy of each customer’s data. Users have complete and granular control over who they choose to allow to have visibility and access to key elements of the Wonderware Online InSight service. At any time, users can add, modify and remove users from their account, facilitating a “least privilege” organizational approach to cybersecurity.

Try Wonderware Online InSight FREE today by visiting online.wonderware.com.  

Additional Helpful Links:

For more information on our Industrial Information Management portfolio, and how we are unlocking actionable insights within customer data contact sales:

Find Your Local Distributor