Manifattura high-tech
Secure your high-tech manufacturing operations and produce devices with inherent security capabilities
The connected devices produced by high-tech manufacturers are attractive targets for cybercriminals, who seek opportunities to use devices for illicit activities, such as man-in-the-middle attacks, intercepted/manipulated data-in-transit and more. Entrust nShield® HSMs and data encryption solutions are trusted by manufacturers worldwide to address today's high-tech manufacturing security challenges.
Sfide
Attacks on Connected Devices
Devices or attackers impersonating a trusted device or user could use that status to conduct a range of illicit activities, such as a man-in-the-middle attack, tapping into corporate networks, and more. Advanced persistent threats can take control of device software to steal customer information or intellectual property.
Introduzione di codice non autorizzato
Insufficient security over code updates can allow hackers an entry point to the device in order to launch attacks or steal data from the device itself. Without adequate security measures at the factory, unauthorized code can also be introduced during the production process itself.
Esecuzioni di produzione non autorizzate
Unsecured manufacturing processes can lead to production of unauthorized units that can be sold on the black market, either with authentic branding or white labeled. This exposes the organization to significant financial and reputational damage.
Soluzioni
Device Authentication with Digital Certificates
Manufacturers use Entrust nShield HSMs in conjunction with security applications to secure root signing keys and the issuance of digital certificates, which are injected into connected devices during the production process. Entrust nShield HSMs provides end-to-end protection of the certificate and key generation, and device insertion process, allowing for strong authentication of each device. Read our Polycom case study for a detailed example.
Secure Software and Firmware Updates
Without proper security over software and firmware updates, hackers can inject unauthorized code onto devices to launch attacks or establish a trusted connection to corporate networks. With strong authentication in place, using HSMs to establish a root of trust, the device can validate that any code being introduced comes from a trusted publisher.
Firma del codice FORTE
The best practice to confirm the integrity of code updates and defend against the risks associated with software tampering is to ensure that code is signed highly secure signing processes with private signing keys protected by HSMs. Entrust nShield HSMs are trusted by manufacturers worldwide to secure their critical keys.
Vantaggi
Protezione da danni finanziari e al marchio
Difendendoti dalla produzione di unità non autorizzate puoi mitigare il marchio e i danni finanziari associati all'eccessiva costruzione e alla clonazione, soprattutto con impianti di produzione da remoto.
Ensure Only Authorized Code is Running on Devices
By allowing only unauthorized code to run on devices you can defend against:
- Hacker using the device's trusted status to tap into networks or conduct man-in-the-middle attacks
- Software that sidesteps organizational policies
- Erroneous or malicious code introduced by vendors in your supply chain
Risparmio sui costi e opportunità di guadagno
Con la possibilità di aggiornare i dispositivi distribuiti sul campo, puoi ridurre i tempi e i costi associati agli aggiornamenti di persona. È inoltre possibile fornire aggiornamenti del firmware che creano nuove opportunità di guadagno attraverso migliori prestazioni del prodotto o funzionalità aggiuntive.
Risorse
Analyst Report: The Role of Authentication in Manufacturing IoT
This paper addresses the authentication challenges facing IoT device manufacturers as well as device users, and enumerates resulting business impacts and specific recommendations.
Scheda tecnica: Scheda tecnica di formazione per sistemisti certificati HSM nShield Entrust
The nCSE provides the training to give your people the knowledge to get the most from your investment. Getting the best from your technology depends on how much you invest in it...
Casi d'uso

nShield accelera l'integrazione di Polycom dei certificati digitali nei telefoni
Polycom si rivolge a nShield Professional Services e HSM nShield Entrust per migliorare la sicurezza VoIP. nShield accelera l'integrazione di Polycom dei certificati digitali nei telefoni...

Qube Cinema rivoluziona la distribuzione del cinema digitale con l'aiuto di HSM nShield Entrust
In qualità di produttore di server, proiettori, tecnologia di mastering e distribuzione per il cinema digitale, Qube Cinema ha visto un'opportunità unica per introdurre una tecnologia altamente dirompente...