Security Convergence between Information Technology (IT) and Operational Technology (OT) in Industry

In this digital industrial development era, manufacturing companies can use various connected devices to monitor and remotely control or change devices (machines/tools) such as conveyor belts, valves, fans, pumps, and others.

However, this also increases the potential consequential threats or disruptions to the sustainability of the factory supply chain.

Every device connected to TCP/IP gives irresponsible parties the opportunity to intrude and jeopardize production activities and factory KPIs. Understanding and cooperation between IT and OT elements are needed to mitigate this threat.

 

For details on OT Security Please Read on The Importance of Cybersecurity in the OT Sector

 

The main concern of this IT-OT convergence is visibility. Hundreds of PLC-DCS sensors should be able to be monitored not only via HMI/SCADA, but also can be securely monitored remotely. The database must be able to create Big Data for follow-up actions. For this reason, security solutions are needed to keep them running normally. These preventive solutions are required in order to identify & counteract these risks.

 

NGFW (New Generation Firewall)

The primary security measure for this convergence is a powerful Next Gen Firewall toolkit.

This device that also functions as a gateway will monitor network traffic, perform filtration, and allow only safe traffic.

NGFW will constantly update you when something interferes with network performance and the number of individuals accessing the network and give you a comprehensive assessment needed to select sufficient capacity devices.

No matter how sophisticated your security devices are in protecting lanes, internal threats also need to be anticipated. We can approach it from the end-user side that performs on-site maintenance by connecting the laptop to the HMI directly for configuration. In general, these machines still use the old Operating System which is known to be stable. This is a risky move if it is connected anywhere because there is no security update available for that version. This is where the Endpoint Detection & Response agent needs to be installed on the HMI.

 

EDR (Endpoint Detection & Response)

EDR functions as a protective barrier, where the maintenance staff can safely configure/maintain machines. For devices that are connected to the local wifi, the security measure on the access point device can be a barrier.

 

Sandboxing

Sandboxing is required because the development of malware and viruses, like Zero-Day attacks, are increasingly frequent and common. For optimal prevention, Sandboxing technology can be used for early testing in a self-contained environment, as a filter for files, attachments, URLs, and programs from incoming/outgoing traffic.

In implementing these various security solutions, especially in the Operational Technology aspect, good integration is needed in terms of the specific environment per factory and the technology used so your investment can be optimal.

You can contact us ACS Group, to discuss what solutions are suitable for your business organization.

Power Your Business with a Private Cloud Solution

The presence of the Cloud has a positive impact on companies, especially in terms of the scope and value of the benefits. Currently, many companies are completely dependent on this information technology in meeting and achieving business goals. These companies implement the advantages of Cloud technology in terms of availability, scalability, resources, network security, virtual storage for business operations.

Private Cloud is a “dedicated” or “internal” Cloud computing. Private Cloud solely serves all the needs of one company only. Private Cloud network data and resources are stored in a dedicated environment unaffected by other parties. Companies typically choose Private Clouds because of their network security, compliance, and scalability options. With a high volume of sensitive information, such as customer information, confidential internal documents containing, intellectual property, and business plans, natrually, companies need extra information system network defense and security.

Private Cloud is has been applied in many government, health, education, telecommunications organizations, and others. Private Cloud has many advantages that other Cloud computing alternatives don’t offer. Here are some of the benefits of Private Cloud technology:

1. Complete control

The main advantage of the Private Cloud is its complete control, complete independence, and does not depend on other parties’ aspects. Thus, the Private Cloud can be easier to access when needed. The management and change of the platform can also be done efficiently if needed. Things like downtime and bottle-necks in service delivery can be predicted and calculated. The use of resources per the company’s needs can be managed better. Compared to the Public Cloud, Public Cloud is more flexible in resources management.

2. Stability

Cloud offers flexibility to utilize various types of media in building a storage platform. With network security that is always ready with a comprehensive backup recovery and backup solution, Private Cloud is more stable. In the Private Cloud, everything is fully controlled by the scalable management of the company.

3. Customization & tailoring ability

Companies can configure a Private Cloud so it suits their business needs best. Private Clouds are also easy to adjust to fit the company’s development in terms of size, industry, overhead, goals, and other factors. The company can set the best requirements based on availability, security, and scalability needs.

4. Compliance

With complete control capabilities, the company has greater control over the infrastructure and the platform which complies with appropriate industry rules and regulations based on business objectives. Unlike the Private Cloud, data control in the Public Cloud will be more difficult and can be subject to external inspection or interception by outside parties.

5. Availability

Cloud Computing can scale resources as needed. The continuity of business operations is highly dependent on availability. In the Private Cloud, if there are resources that do not work, for example, there is a server device that is down, then the data will automatically be replicated to other resource locations. Therefore, the data will always be available at any time. When business operations are in peak periods, bandwidth and network resources can also be increased to support business needs.

6. The Obtained Value

When compared to a Public Cloud, the cost of implementing a Private Cloud will be noticeably more expensive. But the actual price of infrastructure will depend on many factors. While Public Clouds are a cost-effective option that can accommodate highly diverse or unpredictable enterprise needs, infrastructure costs for predictable Private Clouds workloads are much more cost-effective. Private Cloud investment as enterprise infrastructure will be valuable considering its unmatched integrity and network security value.

To meet growing business needs and rapid digital transformation, companies need a simple, secure, and scalable Private Cloud infrastructure for their VDI (Virtual Desktop Infrastructure), business applications, databases, analytics, Cloud Native needs, and so on.

Nutanix’s Private and Hybrid Cloud solutions that is built on hyper-converged infrastructure (HCI) software will bridge the infrastructure imbalance over the years. This solution is equipped with native protection, consolidated data services, and can operate automatically and intelligently, which is an ideal foundation for Private Cloud in the company.

Nutanix offers an infrastructure that is easy to operate and scale. This infrastructure is also combined with consolidated data services, intelligent operation, automation, self-service, and is equipped with data protection. Network security and its.

For more detailed information, please see the video on ACS Group’s youtube ACS Group’s youtube “Improve Business with a Flexible and Dynamic Cloud

Understanding Infinite Enterprise Cloud Computing with Extreme Network and Blue Power Technology

Cloud computing is a most sought-after technology that supports business activities. Cloud computing is an on-demand computer system resource, with data storage (cloud storage) and computing power feature, without direct active management by the user. The Cloud offers various services, such as data storage, servers, databases, networks, and software. Cloud computing is the primary choice for many companies because it has many advantages, such as cost savings, increased productivity, speed, efficiency, performance, and security in running business operations. Nowadays, Cloud computing is a crucial technology for IT professionals.

Together with Blue Power Technology and Extreme Network, ACS Group once again held a Virtual Event with the theme “Infinity and Beyond”. The Virtual Event, which took place on 17th March 2022, was held online via Zoom and broadcasted live on Youtube. This event focused on information about Extreme Company Overview, Extreme Product Knowledge, and  ExtremeCloud demonstrations/walkthroughs. With this event, ACS Group aims to informatively educate and introduce the Cloud solutions offered by Extreme Network to a nationwide audience, IT professionals and developers, and consumers and businesses.

Extreme Network itself has been number one in the Gartner Magic Quadrant four times in enterprise wiring and WLAN infrastructure. Extreme Network has also been recognized by Omdia, an independent analyst and consulting firm in global coverage of Telecommunications, Media, and Technology, as the fastest-growing Cloud network vendor. Focusing on three distinct pillars—simple, flexible, and secure—Extreme is the leading Cloud provider that many companies prefer. With end-to-end automation, Extreme offers simple network configurations that minimize human intervention. Smart management features equipped with AI (Artificial Intelligence) and anomaly alarms are also available to make it easier for users to monitor the network so precaution steps can be prepared before problems occur. Not only Cloud-based solutions but Extreme Network also provides on-premise solutions.

You can re-watch the Virtual Event “Infinity and Beyond” with Blue Power Technology and Extreme Network on ACS Group Youtube or by clicking this link.

Understanding RFID and the Benefits of Implementing RFID for Industry

In industrial development, technology is needed to improve efficiency and automatic identification of operations. One of those technology is RFID (Radio Frequency Identification) which utilizes radio waves to store and retrieve data without direct contact. RFID Implementation will help you read data simultaneously in large quantities up to 100-200 assets.

Previously, in the identification field, barcode technology had existed before RFID technology, but in the study conducted by several business sectors, the RFID tags demand would be increasing much faster than barcode technology in RFID implementation.

For this reason, RFID and Barcode Technology have their respective roles and requirements, so we must tailor them according to the industry type and business processes.

The difference between RFID and Barcode is in the Identification process. RFID identification requires two devices, namely RFID TAG and RFID READER.

Based on its resources, RFID TAG is divided into:

  • Passive RFID Tags

Passive Tag is using a magnetic field generated by radio waves from the RFID tag reader as its resource and the information data transmission is shorter (< 20 meters).

  • Active RFID Tags Active RFID Tag is a Tag with a battery as its power source and the data information transmission can be further (+/- 100 meters).

RFID uses radiofrequency waves to store and retrieve data. RFID will be connected if it is on the same frequency as the tag. Currently, there are 4 types of frequency bands for RFID, namely :

  • Low-Frequency tags (between 125 to 134 kHz)

This frequency is usually used for animal tracking purposes, tracking an asset and access doors.

  • High-Frequency tags (13.56 MHz)

This frequency is generally used for access door purposes, payment instruments, and ID cards.

  • UHF tags (868 to 956 MHz)

This frequency is commonly used for tracking moving assets and pallet systems.  Indonesian Ministry of Communication and Informatics permits UHF RFID at a 920MHz-923MHz frequency.

  • BLE (Bluetooth Low Energy) at a frequency of 2.45 GHz.

Before implementing RFID in your industry, there are several tips that ACS Group summarizes in implementing RFID:

  • RFID is not a security tool

RFID tags have an add-on characteristic whereas they are affixed to the assets. This does not guarantee RFID accountability as a security tool unless the tag is planted within the product.

RFID will be more effective if utilized in a close loop area because it can be rewritten 100,000 times.

RFID must be used continuously. Single-use RFID results in expensive economic value.

  • Read distance of RFID Determining RFID quality cannot only be assessed from the reading distance. The effectiveness of RFID reading distance will also depends on the business process.

RFID implementation has become vital because its only need to use codes or tags for identification to retrieve data automatically without physical contact. Furthermore, RFID implementation will increase storing or tracking data information effectiveness. Companies can calculate all of their assets within a few seconds with RFID. It will save a lot of money and energy.

Contact us ACS Group as a pioneer of Auto-Identification and a leader in Auto-Identification solutions and barcode systems since 1991 for RFID Implementation to increase efficiency and productivity of your business and organization.

For more detailed information, please watch ACS Group’s youtube video “Perkembangan & Manfaat RFID dan Barcode Untuk Industri”

Get to know Cloud Solutions for Business and Industry

In recent years, more companies and organizations have started their digitization journey to improve the efficiency and effectiveness of their business operations. Cloud technology is now one of the most effective solutions existed. In addition to functioning as a technical foundation and an innovative backbone, Cloud makes it possible to secure data, especially when network security needs to be upgraded.

Cloud Computing is an internet-based technology that allows computerization, applications operation, databases (DB) processes and store them virtually to the server. Cloud computing will store all data and information on one server and it can be accessed anytime and anywhere via the internet without us needing extra time and funds to install and configure servers, storage, or databases.

The main principles of cloud computing are:

  • Available via the internet
  • Based on user needs
  • Pay as needed

In general, Cloud Computing can be categorized into three types of services according to the solution:

  • Private Cloud

Private Cloud is a “dedicated” or “internal” cloud computing service that is used specifically for enterprise organization data or applications.

Enterprise-level organizations usually choose this private Cloud because of their data privacy policy. The policy is usually related to their network security that requires a high level of data security.  Their sensitive data varies but usually range from customer information, confidential internal documents, or business plans. Naturally,  enterprise organizations require extra information system defense and security.

To meet increasing business demands and accelerate digital transformation, enterprise organizations require a simple, secure, and scalable private cloud infrastructure for VDI (Virtual Desktop Infrastructure), business applications, databases, analytics, cloud-native needs. Nutanix‘s private and hybrid cloud solution is a hyper-converged infrastructure (HCI) software that will bridge the infrastructure gap. It is equipped with native protection, consolidated data service, and it operates in an automated and intelligent manner which is an ideal foundation for private clouds in enterprises.

  • Public Cloud

Public Cloud is a cloud service consist of resources, applications, and storage that are available to public and can be used by anyone with an internet connection. Users can use its service for free or only with a rental fee, without needing to buy, install, operate, or maintain cloud servers and other equipment like when using a private cloud.

Network security  and data security are the main priority for all cloud storage services. One of the disadvantages of this public cloud service is data theft and cybercrime risk that can harm users. Therefore, users need to find an accountable provider with strict security that can backup the cloud data.  Backuping data will increase security, compliance, business continuity, and disaster recovery. It must also be accessible from various locations as long as there is a connection Internet.

ACS Group offers a comprehensive range of global cloud computing services to empower online businesses internationally and support e-commerce ecosystems around the world. In collaboration with Alibaba Cloud, ACS Group offers elaborate Public Cloud and cloud computing services suitable for large or small businesses, individual developers, and any public sector in more than 200 countries and regions.

  • Hybrid Cloud

It has combined elements from the Public Cloud and Private Cloud. Hybrid Cloud allows enterprise organizations to communicate and exchange data between public and private clouds, which provides greater flexibility. This is ideal for enterprise organizations that want to utilize the advantages of both types of deployment.

Therefore, your organization needs to understand the purpose of using the Cloud and choose one that suits your needs the best. Type of industry, operations, and business processes are several factors that can be considered when choosing the accurate Cloud Solution.

The choice of each feature or component implementation from the Cloud can be categorized into one of three service models:

  1. IaaS (Infrastructure as a Service)

The Infrastructure as a Service model is the basic foundation of Cloud Service. We can rent server virtualization storage and network configurations that are ideal for company needs. Specifications can be adjusted as needed and you only need to pay for the instances that you use. In other words, you don’t need to think about procuring server hardware and maintenance because the cloud provider will accommodate it.

On Alibaba Cloud, IaaS is covered by ECS (Elastic Compute Service) as a high-performance, stable, and reliable computing service. Not only that, but this service is also scalable. ECS can eliminate initial hardware investment and provide scalability of computation resources as needed.

  1. PaaS (Platform as a Service)

If an interface program, run-time environment, or operating system is needed for application development you can consider a Platform as a Service based solution. You only need to upload the application code to the platform and the application can be used immediately. An example of a Platform as a Service is Alibaba Cloud‘s Relational Database Service.

  1. SaaS (Software As A Service)

It is a service provided in the form of software in a web service where users can use the application without knowing how the data is stored or how the application is maintained. Software as a Service usually comes in form of a package with less flexible customization options.

Users can take advantage of the services directly for free or by paying a rental fee without having to build applications platform configuration and infrastructures. Everything about the application is guaranteed by the service provider and users do not have full control rights over the application.

Currently, many information technology (IT) operations are burdened with various data storage systems, whether in traditional ways or on-premise ways, to accommodate both structured data and unstructured data. This may not only expensive but also challenging in terms of managing flexibility.

With the rapid development of technology, Cloud Service is an increasingly mandatory and customary solution to consider. Increasing sophisticated security options allow us to achieve optimal control, flexible scalable scalability, and guaranteed availability when creating dynamic business operations.

ACS Group in association with Alibaba Cloud as a public cloud service provider, and with Nutanix as an IT infrastructure vendor with its enterprise cloud platform will always be ready to support loyal customers in implementing Private, Public, and Hybrid clouds that can provide many benefits for your company.

For more detailed information, please see the video on ACS Group’s youtube ACS Group’s youtube “Improve Business with a Flexible and Dynamic Cloud

Zebra Healthcare provides Visibility & Efficiency for health services.

Zebra presents a technology solution for the Healthcare industry that will connect medical personnel with patient data, it will be easier for medical personnel to record patient medical records both for consultation and for treatment management, of course for systematic and precise results for administering patient services in obtaining health services.

With the development of technology in the health sector, it will certainly make it easier for patients to access information and health services according to their needs, so doctors and medical personnel will certainly find it easier to meet patient needs.

For this reason, the role of technology is very important to connect the health industry to the needs of patients and Zebra is a brand that specializes in data management with the right technology in the Healthcare industry such as wristbands, label printers, barcode scanners, and mobile computers that can provide visibility and create efficiencies throughout the healthcare industry. That’s why ACS Group is here to bring the latest technology in health care to your facility.