YOU ARE AT:SecuritySchneider unveils managed security service, warns of rising OT risk from 5G-IoT

Schneider unveils managed security service, warns of rising OT risk from 5G-IoT

On the back of its launch of a new managed security services (MSS) portfolio, France-based energy management and automation specialist Schneider Electric has warned that new cellular-based operational technology (OT) solutions – advancing notably with the introduction of private 5G systems, flanked also by the steady rise of non-cellular IoT in OT environments – will leave enterprises badly exposed if security is not taken seriously from first inception of new Industry 4.0 deployments.

The firm quoted figures from Statista, that one quarter (24.8 percent) of cyber-attacks are on enterprises in the manufacturing sector, outstripping finance (18.9 percent) and professional services (14.6 percent), in second and third, by some margin. It said its new OT-focused MSS offering is geared to minimize downtime, theft of intellectual property, and other disruption caused by system vulnerabilities – which are multiplying, along with new attack vectors, as production lines and workers become hyper-connected. 

Schneider unveils managed security service, warns of rising OT risk from 5G-IoT
Drias – security must be the priority, whatever tech is deployed

Speaking with RCR Wireless, Zakarya Drias, director of managed security services at Schneider Electric, commented: “Integrating cellular… acts as a catalyst for the digital transformation of industrial companies, unlocking operational efficiencies and scalability. However, as with any technological advancement, if these networks are adopted without prioritising security – both during the technology’s design phase and its deployment as well operation in the field – a range of risks can permeate the shop floors.” 

He went on: “Such risks could potentially expose industrial facilities and processes to cyber threats, thereby jeopardising the hard-earned benefits of embracing digital transformation… Successful assimilation of digital technologies, such as 4G/5G, must be intertwined with a robust cybersecurity program… [to] extend beyond the technology itself and encompass every facet of industrial operations.” 

Drias emphasised the importance of by-design, round-the-clock security which also engages (and “empowers”) the emerging Industry 4.0 workforce with correct training, and thereby appropriate vigilance. He said: “Embracing new digital frontiers demands a holistic commitment to cybersecurity. This commitment not only safeguards technological advancements but also fortifies the core of industrial operations, ultimately facilitating a secure and resilient digital transformation journey.”

The new MSS offer hinges on a newly developed Cybersecurity Connected Service Hub (CCSH), which provides “proven technologies as flexible services to monitor cyber threats and proactively respond on behalf of customers”, the company said. The firm claimed to be “one of the few global MSS providers” to integrate security monitoring and remediation support; its MSS service is vendor agnostic, system agnostic, and industry agnostic, it said – basically that it will work anywhere, with any enterprise. 

It is “backed by advanced machine learning and trend analysis”, it said. “Few companies, especially those in the OT space, have the specialised cybersecurity resources or expertise in house,” it argued.

In conversation with RCR Wireless, Drias commented: “[Private] 4G/5G is a crucial element in the tech stack, demanding careful assessment, secure design, and continuous threat monitoring – all services [we] deliver today. To achieve this, we leverage advanced technologies and streamlined processes to improve threat detection and rapid resolution in [cellular] environments…. This ensures the timely identification and mitigation of potential vulnerabilities, ultimately putting customers ahead of threat actors.”

Asked specifically how much the security risk and its own security solution are informed, also, by IoT connectivity going into OT environments, whether 5G-based IoT or other low-power IoT systems, Drias responded: “Integration of IoT into OT environments significantly shapes both risk assessment and solution strategies. This holds true for various IoT technologies. The integration of IoT [into] OT realms introduces a dynamic interplay of advantages and complexities across security, scalability, and efficiency domains.

“Challenges arise predominantly when these technologies are adopted without due consideration for security. This can lead to an expanded risk exposure and a broader attack surface. Central to overcoming these challenges is the strategic deployment of security measures while respecting the operational context. It’s vital to acknowledge that while security measures designed for IT environments might be pertinent, their application within OT settings often requires thoughtful adaptation

“Ultimately, the synthesis of IoT connectivity and OT operations demands a meticulous balance between embracing innovation and safeguarding the core functions. By conscientiously integrating security measures within the operational framework, these challenges can be addressed, bolstering both the integrity of the technology and the resilience of the overarching operational environment.”

ABOUT AUTHOR

James Blackman
James Blackman
James Blackman has been writing about the technology and telecoms sectors for over a decade. He has edited and contributed to a number of European news outlets and trade titles. He has also worked at telecoms company Huawei, leading media activity for its devices business in Western Europe. He is based in London.