Security Convergence between Information Technology (IT) and Operational Technology (OT) in Industry

In this digital industrial development era, manufacturing companies can use various connected devices to monitor and remotely control or change devices (machines/tools) such as conveyor belts, valves, fans, pumps, and others.

However, this also increases the potential consequential threats or disruptions to the sustainability of the factory supply chain.

Every device connected to TCP/IP gives irresponsible parties the opportunity to intrude and jeopardize production activities and factory KPIs. Understanding and cooperation between IT and OT elements are needed to mitigate this threat.


For details on OT Security Please Read on The Importance of Cybersecurity in the OT Sector


The main concern of this IT-OT convergence is visibility. Hundreds of PLC-DCS sensors should be able to be monitored not only via HMI/SCADA, but also can be securely monitored remotely. The database must be able to create Big Data for follow-up actions. For this reason, security solutions are needed to keep them running normally. These preventive solutions are required in order to identify & counteract these risks.


NGFW (New Generation Firewall)

The primary security measure for this convergence is a powerful Next Gen Firewall toolkit.

This device that also functions as a gateway will monitor network traffic, perform filtration, and allow only safe traffic.

NGFW will constantly update you when something interferes with network performance and the number of individuals accessing the network and give you a comprehensive assessment needed to select sufficient capacity devices.

No matter how sophisticated your security devices are in protecting lanes, internal threats also need to be anticipated. We can approach it from the end-user side that performs on-site maintenance by connecting the laptop to the HMI directly for configuration. In general, these machines still use the old Operating System which is known to be stable. This is a risky move if it is connected anywhere because there is no security update available for that version. This is where the Endpoint Detection & Response agent needs to be installed on the HMI.


EDR (Endpoint Detection & Response)

EDR functions as a protective barrier, where the maintenance staff can safely configure/maintain machines. For devices that are connected to the local wifi, the security measure on the access point device can be a barrier.



Sandboxing is required because the development of malware and viruses, like Zero-Day attacks, are increasingly frequent and common. For optimal prevention, Sandboxing technology can be used for early testing in a self-contained environment, as a filter for files, attachments, URLs, and programs from incoming/outgoing traffic.

In implementing these various security solutions, especially in the Operational Technology aspect, good integration is needed in terms of the specific environment per factory and the technology used so your investment can be optimal.

You can contact us ACS Group, to discuss what solutions are suitable for your business organization.

Understanding RFID and the Benefits of Implementing RFID for Industry

In industrial development, technology is needed to improve efficiency and automatic identification of operations. One of those technology is RFID (Radio Frequency Identification) which utilizes radio waves to store and retrieve data without direct contact. RFID Implementation will help you read data simultaneously in large quantities up to 100-200 assets.

Previously, in the identification field, barcode technology had existed before RFID technology, but in the study conducted by several business sectors, the RFID tags demand would be increasing much faster than barcode technology in RFID implementation.

For this reason, RFID and Barcode Technology have their respective roles and requirements, so we must tailor them according to the industry type and business processes.

The difference between RFID and Barcode is in the Identification process. RFID identification requires two devices, namely RFID TAG and RFID READER.

Based on its resources, RFID TAG is divided into:

  • Passive RFID Tags

Passive Tag is using a magnetic field generated by radio waves from the RFID tag reader as its resource and the information data transmission is shorter (< 20 meters).

  • Active RFID Tags Active RFID Tag is a Tag with a battery as its power source and the data information transmission can be further (+/- 100 meters).

RFID uses radiofrequency waves to store and retrieve data. RFID will be connected if it is on the same frequency as the tag. Currently, there are 4 types of frequency bands for RFID, namely :

  • Low-Frequency tags (between 125 to 134 kHz)

This frequency is usually used for animal tracking purposes, tracking an asset and access doors.

  • High-Frequency tags (13.56 MHz)

This frequency is generally used for access door purposes, payment instruments, and ID cards.

  • UHF tags (868 to 956 MHz)

This frequency is commonly used for tracking moving assets and pallet systems.  Indonesian Ministry of Communication and Informatics permits UHF RFID at a 920MHz-923MHz frequency.

  • BLE (Bluetooth Low Energy) at a frequency of 2.45 GHz.

Before implementing RFID in your industry, there are several tips that ACS Group summarizes in implementing RFID:

  • RFID is not a security tool

RFID tags have an add-on characteristic whereas they are affixed to the assets. This does not guarantee RFID accountability as a security tool unless the tag is planted within the product.

RFID will be more effective if utilized in a close loop area because it can be rewritten 100,000 times.

RFID must be used continuously. Single-use RFID results in expensive economic value.

  • Read distance of RFID Determining RFID quality cannot only be assessed from the reading distance. The effectiveness of RFID reading distance will also depends on the business process.

RFID implementation has become vital because its only need to use codes or tags for identification to retrieve data automatically without physical contact. Furthermore, RFID implementation will increase storing or tracking data information effectiveness. Companies can calculate all of their assets within a few seconds with RFID. It will save a lot of money and energy.

Contact us ACS Group as a pioneer of Auto-Identification and a leader in Auto-Identification solutions and barcode systems since 1991 for RFID Implementation to increase efficiency and productivity of your business and organization.

For more detailed information, please watch ACS Group’s youtube video “Perkembangan & Manfaat RFID dan Barcode Untuk Industri”